Analysis and evaluation of three methods for tag identification in OSK RFID protocol

Feasibility for improving the efficiency of the tag identification phase in OSK (Ohkubo, Suzuki i Kinoshita) RFID protocol is analyzed in this paper. First, the basic identification technique is presented in general. Then, a procedure for speeding up the identification by employment of TMTO (Time Memory Trade Off) approach is explained. Balancing between memory and time requirements is achieved with the chaining technique and introduction of an off-line, preparatory phase. As an additional effort, a second TMTObased level is proposed. It relies on a special look-up table which consists of the equidistant states generated during preparatory phase. The complexity of the proposed technique is discussed along with some numerical evaluation results obtained through experiments.

[1]  Hsin-Lung Wu,et al.  On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[2]  Violeta Tomašević,et al.  Time-Memory Trade-Off in RFID Systems , 2016 .

[3]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[4]  Fu Chun-chang Hash-based RFID mutual authentication protocol , 2012 .

[5]  Lei Zhang,et al.  A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography , 2018, Wirel. Pers. Commun..

[6]  Philippe Oechslin,et al.  Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.

[7]  Mandeep Kaur,et al.  RFID Technology Principles, Advantages, Limitations & Its Applications , 2011 .

[8]  Violeta Tomašević,et al.  Speeding Up Tag Identification in OSK RFID Protocol , 2018, 2018 26th Telecommunications Forum (TELFOR).

[9]  Milo Tomasevic,et al.  Double Time-Memory Trade-Off in OSK RFID Protocol , 2019, Wirel. Pers. Commun..

[10]  Milo Tomasevic,et al.  An analysis of chain characteristics in the cryptanalytic TMTO method , 2013, Theor. Comput. Sci..

[11]  Martin E. Hellman,et al.  A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.

[12]  Irfan Syamsuddin,et al.  A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[13]  Kwangho Jung,et al.  A systematic review of RFID applications and diffusion: key areas and public policy issues , 2015, Journal of Open Innovation: Technology, Market, and Complexity.

[14]  Gildas Avoine,et al.  Analysis of Rainbow Tables with Fingerprints , 2015, ACISP.

[15]  Gildas Avoine,et al.  Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography , 2013, IEEE Transactions on Mobile Computing.

[16]  Xu Zhuang,et al.  Security Issues in Ultralightweight RFID Authentication Protocols , 2018, Wirel. Pers. Commun..