Efficient identity authentication and encryption technique for high throughput RFID system

Radio Frequency Identification RFID technology provides a seamless link between physical world and the information system in cyber space. However, the emerging Internet of Things and cloud systems are full of security holes, which introduce new challenging security problems in both tag identification and data privacy. In this paper, we present efficient methods for identity authentication and data encryption to enhance RFID privacy. The proposed techniques aim to ensure no adversary interacting with the tags and the reader, to infer any information on a tag's identity from the communication. The main idea, a symmetric cryptography technique, termed as Advanced Encryption Standard, was applied to implement both mutual authentication and data encryption between the front and back ends of RFID systems. The Advanced Encryption Standard cryptographic algorithm was adopted because of its low hardware complexity and high security strength. In addition, the proposed key management protocol is proved resistant to several known RFID attacks such as Man-in-the-Middle, Denial-of-Service, replay, clone attack, and backward/forward traceability. The computational time complexity of the proposed scheme through the entire identity authentication and data encryption phases is 3Tencrypt+1Tnonce+4Txor, which is superior to most existing approaches. The proposed scheme was also proved to be able to provide higher data encryption performance than other symmetric cryptographic algorithms with regard to the same level of security strength. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Carlisle M. Adams,et al.  Improving security and usability of low cost RFID tags , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[2]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[3]  Christos A. Papachristou,et al.  Efficient architectures for elliptic curve cryptography processors for RFID , 2009, 2009 IEEE International Conference on Computer Design.

[4]  Sangeeta Sharma,et al.  The Evolution of RFID Security and Privacy: A Research Survey , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[5]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[6]  Samson Lasaulce,et al.  Gaussian Broadcast Channels with an Orthogonal and Bidirectional Cooperation Link , 2008, EURASIP J. Wirel. Commun. Netw..

[7]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[8]  Jemal H. Abawajy,et al.  Mutual Authentication Protocol for Networked RFID Systems , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[9]  KyungOh Lee,et al.  An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems , 2006 .

[10]  Ching-Hsien Hsu,et al.  Performance-Effective and Low-Complexity Redundant Reader Detection in Wireless RFID Networks , 2008, EURASIP J. Wirel. Commun. Netw..

[11]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[12]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[13]  Hongnian Yu,et al.  An efficient and secure authentication protocol for RFID systems , 2011, The 17th International Conference on Automation and Computing.

[14]  Ching-Hsien Hsu,et al.  A Priority Based Transaction mechanism towards high reliable RFID services , 2009, Int. J. Ad Hoc Ubiquitous Comput..

[15]  Ching-Hsien Hsu,et al.  Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems , 2011, Inf. Syst. Frontiers.

[16]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[17]  C. M. Roberts,et al.  Radio frequency identification (RFID) , 2006, Comput. Secur..

[18]  Young-Sil Lee,et al.  Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[19]  Sung Kwon Kim,et al.  Hash-Based RFID Tag Mutual Authentication Scheme with Retrieval Efficiency , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications.

[20]  Sándor Imre,et al.  Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[21]  Suna Choi,et al.  Security Enhanced Authentication Protocol for UHF Passive RFID System , 2011, ICWMC 2011.

[22]  SungJin Kim,et al.  RFID Security Protocol by Lightweight ECC Algorithm , 2007, Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007).

[23]  Ritu Agarwal,et al.  Peformance analysis of data encryption algorithms , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[24]  Thomas Hjorth Supporting Privacy in RFID Systems , 2004 .

[25]  Ching-Hsien Hsu,et al.  Alleviating reader collision problem in mobile RFID networks , 2009, Personal and Ubiquitous Computing.

[26]  Boyeon Song RFID Authentication Protocols using Symmetric Cryptography , 2009 .

[27]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.