Double Time-Memory Trade-Off in OSK RFID Protocol

The OSK/AO protocol has already demonstrated how the application of time-memory trade-off (TMTO) increases the efficiency of a hash chain-based RFID protocol. The complexity of this protocol, both in the preparatory phase and in the tag identification, is greatly influenced by chain generation procedure. Since the hash values in chain nodes are generated independently and randomly, the repetition of the same calculations impairs the protocol efficiency. This paper proposes an improved procedure for a faster chain generation by employing a special table with equidistant states from the tag state space. It provides that hash functions calculations for a node start not from the beginning but from a nearest state stored in the table. Consequently, the number of repeated hash calculations is significantly reduced. After the new OSK/TMTO2 protocol is precisely formalized, a complexity analysis is carried out with detailed consideration of two cases (with and without additional memory for the table). A comparison of the proposed protocol with OSK/AO is also conducted. The practical restrictions on configuration of an RFID system with the new protocol are stated as well. Finally, the conducted analysis is illustrated by numerous examples with wide spectrum of relevant parameter values.

[1]  Jiang Wu,et al.  A Highly Scalable RFID Authentication Protocol , 2009, ACISP.

[2]  Flavio D. Garcia,et al.  Modeling Privacy for Off-Line RFID Systems , 2010, CARDIS.

[3]  Ahmed Khattab,et al.  RFID Security Threats and Basic Solutions , 2017 .

[4]  Xu Zhuang,et al.  Security Issues in Ultralightweight RFID Authentication Protocols , 2018, Wirel. Pers. Commun..

[5]  Gildas Avoine,et al.  Deploying OSK on Low-Resource Mobile Devices , 2013, RFIDSec.

[6]  Irfan Syamsuddin,et al.  A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[7]  Sozo Inoue,et al.  A Secure High-Speed Identification Scheme for RFID Using Bloom Filters , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[8]  Lei Zhang,et al.  A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography , 2018, Wirel. Pers. Commun..

[9]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[10]  Hsin-Lung Wu,et al.  On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[11]  Qiang Zhao,et al.  RFID ownership transfer protocol based on cloud , 2016, Comput. Networks.

[12]  Gildas Avoine,et al.  Analysis of Rainbow Tables with Fingerprints , 2015, ACISP.

[13]  Wang Bailing,et al.  Hash-based RFID Mutual Authentication Protocol , 2013 .

[14]  Jian Shen,et al.  A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications , 2018, J. Ambient Intell. Humaniz. Comput..

[15]  Tania Martin Privacy in RFID systems , 2013 .

[16]  Gildas Avoine,et al.  Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography , 2013, IEEE Transactions on Mobile Computing.

[17]  Ari Juels,et al.  Defining Strong Privacy for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[18]  Philippe Oechslin,et al.  Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.

[19]  Enrique Valero,et al.  Evolution of RFID Applications in Construction: A Literature Review , 2015, Sensors.

[20]  Kwangho Jung,et al.  A systematic review of RFID applications and diffusion: key areas and public policy issues , 2015, Journal of Open Innovation: Technology, Market, and Complexity.

[21]  Milo Tomasevic,et al.  An analysis of chain characteristics in the cryptanalytic TMTO method , 2013, Theor. Comput. Sci..

[22]  De Li,et al.  Audio Watermarking by Coefficient Quantization in the DWT-DCT Dual Domain , 2013 .

[23]  Philippe Oechslin,et al.  Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.

[24]  Mandeep Kaur,et al.  RFID Technology Principles, Advantages, Limitations & Its Applications , 2011 .

[25]  Martin E. Hellman,et al.  A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.

[26]  Wei Jiang,et al.  Lightweight RFID Protocol for Medical Privacy Protection in IoT , 2018, IEEE Transactions on Industrial Informatics.

[27]  Chien-Ming Chen,et al.  On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags , 2017, The Journal of Supercomputing.