Improving the Efficiency of RFID Authentication with Pre-Computation

Security of RFID authentication protocols has received considerable interest recently. However, an important aspect of such protocols that has not received as much attention is the efficiency of their communication. In this paper we investigate the efficiency benefits of pre-computation for time-constrained applications in small to medium RFID networks. We also outline a protocol utilizing this mechanism in order to demonstrate the benefits and drawbacks of using this approach. The proposed protocol shows promising results as it is able to offer the security of untraceable protocols whilst only requiring the time comparable to that of more efficient but traceable protocols.

[1]  Vidyasagar Potdar,et al.  A Survey of RFID Authentication Protocols , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[2]  Pedro Peris-López,et al.  LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .

[3]  Ding Zhen-hua,et al.  A taxonomy model of RFID security threats , 2008, 2008 11th IEEE International Conference on Communication Technology.

[4]  Jie Li,et al.  An authentication protocol for secure and efficient RFID communication , 2010, 2010 International Conference on Logistics Systems and Intelligent Management (ICLSIM).

[5]  Farzana Rahman,et al.  YA-SRAP: Yet another serverless RFID authentication protocol , 2008 .

[6]  Yunhao Liu,et al.  ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.

[7]  Kyung Oh Lee,et al.  SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation , 2007, International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07).

[8]  Keith Mayes,et al.  A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems , 2009, 2009 International Conference on Availability, Reliability and Security.

[9]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[10]  Lei Hu,et al.  Storage-Awareness: RFID Private Authentication based on Sparse Tree , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[11]  Robert H. Deng,et al.  Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[12]  Basel Alomair,et al.  Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.

[13]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[14]  N. Thanthry,et al.  RFID Security Threats to Consumers: Hype vs. Reality , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.

[15]  Basel Alomair,et al.  Privacy versus scalability in radio frequency identification systems , 2010, Comput. Commun..

[16]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[17]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[18]  Xiang Zhang,et al.  Low Cost Minimal Mutual Authentication Protocol for RFID , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[19]  Matthias Schumann,et al.  RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.

[20]  Steven Shepard RFID: Radio Frequency Identification , 2004 .

[21]  Philippe Oechslin,et al.  Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.

[22]  JaeCheol Ha,et al.  LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System , 2006, ICUCT.

[23]  Radu Marculescu,et al.  Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[24]  Mikko Lehtonen,et al.  From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .