HB-MP++ protocol: An ultra light-weight authentication protocol for RFID system

Since Hopper and Blum suggested the HB protocol which is based on the conjectured hardness of the LPN (Learning Parity in the Presence of Noise) problem in 2001, a family of light-weight authentication protocols has been developed for RFID (Radio Frequency Identification) system by many engineers. It was found that each algorithm had own weakness against new attacks so that more advanced protocols have been expanded in order to overcome the attacks. In this paper, we enhance the HB-MP and HB-MP+ protocol, called HB-MP++. Ultra low-weight and concrete function will be used to eliminate vulnerability of the conventional methods. We also provide the security and performance analysis of the proposed protocol.

[1]  Jin-Young Choi,et al.  A Light-weight Security Protocol for RFID System , 2007, PWC.

[2]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[4]  Jonathan Katz,et al.  Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, EUROCRYPT.

[5]  Xuefei Leng,et al.  HB-MP+ Protocol: An Improvement on the HB-MP Protocol , 2008, 2008 IEEE International Conference on RFID.

[6]  Jorge Munilla,et al.  HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.

[7]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[8]  Jonathan Katzand,et al.  Parallel and Concurrent Security of the HB and HB + Protocols , 2006 .

[9]  Man Young Sung,et al.  A FERROELECTRIC BASED PASSIVE RFID TAG FOR UHF (860–960 MHz) BAND , 2007 .

[10]  Kwangjo Kim,et al.  Securing HB+ against GRS Man-in-the-Middle Attack , 2007 .

[11]  Gildas Avoine Radio Frequency Identification: Adversary Model and Attacks on Existing Protocols , 2005 .

[12]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[13]  Yannick Seurin,et al.  HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.

[14]  Sourav Mukhopadhyay,et al.  Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms , 2006, ICCSA.

[15]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[16]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.