Mutual authentication protocol based on tag ID number updating for low-cost RFID

In order to solve the security and privacy problems of low-cost RFID, in which only 250-3k logic gates can be devoted to security-related tasks. Many protocols have recently appeared, but all of them use traditional cryptographic primitives, which is unsuitable for low-cost tags. Some other proposals use non-cryptographic operations such as XOR and CRC, which have disadvantages in at least one aspect. Most importantly, these schemes can not guarantee data synchronism between tag and reader. In this paper, we provide a lightweight mutual authentication protocol based on tag ID number updating for low-cost RFID. This protocol can solve security problems and have better performance than other mutual authentication protocols.

[1]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[2]  C. M. Roberts,et al.  Radio frequency identification (RFID) , 2006, Comput. Secur..

[3]  Martin Feldhofer,et al.  A low-resource public-key identification scheme for RFID tags and sensor nodes , 2009, WiSec '09.

[4]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[5]  Sarah Spiekermann,et al.  Critical RFID Privacy-Enhancing Technologies , 2009, IEEE Security & Privacy.

[6]  Patrick Chi-leung Hui,et al.  Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..

[7]  ChienHung-Yu,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007 .

[8]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[9]  Dong Hoon Lee,et al.  Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.

[10]  D. Wyld Radio Frequency Identification , 2008 .

[11]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[12]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[13]  Berk Sunar,et al.  Universal Hash Functions for Emerging Ultra-Low-Power Networks , 2004 .

[14]  Ors Yalcin,et al.  Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers , 2010, RFIDSec.

[15]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[16]  Berk Sunar,et al.  Energy Comparison of AES and SHA-1 for Ubiquitous Computing , 2006, EUC Workshops.

[17]  Dongho Won,et al.  Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.