A Survey of RFID Authentication Protocols

RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP.

[1]  Pedro Peris-López,et al.  LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .

[2]  Ed Dawson,et al.  Classification of Authentication Protocols: A Practical Approach , 2000, ISW.

[3]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Tieyan Li,et al.  Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.

[5]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[6]  Robert H. Deng,et al.  Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols , 2008, J. Softw..

[7]  Kwangjo Kim,et al.  A Secure RFID Reader Protocol based on SLRRP , 2007 .

[8]  Zhaoyu Liu,et al.  A Secure RFID Identity Reporting Protocol for Physical Attack Resistance , 2006, J. Commun..

[9]  Roberto Di Pietro,et al.  RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[10]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[11]  Robert H. Deng,et al.  Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[12]  Toshiharu Ishikawa,et al.  Applying Auto-ID to the Japanese Publication Business To Deliver Advanced Supply Chain Managment, Innovative Retail Applications, and Convenient and Safe Reader Services , 2004 .

[13]  Mikhail Nesterenko,et al.  RFID security without extensive cryptography , 2005, SASN '05.