An Improved Lightweight RFID Authentication Protocol

This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability within VB’s original successive session key permutation algorithm. We propose three improvements, namely removing bad shuffles, hopping the runs, and authenticating mutually, to prevent DFJ’s attacks, thereby significantly strengthening the security of the protocol without introducing extra resource cost.

[1]  Véronique Nabelsi,et al.  Towards Patient-Driven Agile Supply Chains in Healthcare , 2012 .

[2]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[3]  John Wang Management Innovations for Intelligent Supply Chains , 2012 .

[4]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[5]  Yacine Ouzrout,et al.  An Approach of Decision-Making Support Based on Collaborative Agents for Unexpected Rush Orders Management , 2009, Int. J. Inf. Syst. Supply Chain Manag..

[6]  Jairo R. Montoya-Torres Decision-Making Coordination within Three-Echelon Supply Chains , 2011 .

[7]  William Yu Chung Wang,et al.  Supply Chain Management: Issues in the New Era of Collaboration And Competition , 2006 .

[8]  Gildas Avoine Cryptography in radio frequency identification and fair exchange protocols , 2005 .

[9]  Peter Hills,et al.  Transitioning Towards a Low-Carbon Hydrogen Economy in the United States: Role of Transition Management , 2012, Int. J. Appl. Logist..

[10]  Zhou-Ping Yin,et al.  QTDFS-ALOHA: A Hybrid Collision Resolution Protocol for Dense RFID Tag Environment , 2010, Int. J. Appl. Logist..

[11]  Kevin Fu,et al.  Cryptanalysis of Two Lightweight RFID Authentication Schemes , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[12]  Bryan Parno,et al.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.

[13]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[14]  Mike Burmester,et al.  Forward-secure RFID Authentication and Key Exchange , 2007, IACR Cryptol. ePrint Arch..

[15]  Robert H. Deng,et al.  Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[16]  K. Ganesh,et al.  Genetic Algorithm and Particle Swarm Optimization for Solving Balanced Allocation Problem of Third Party Logistics Providers , 2011, Int. J. Inf. Syst. Supply Chain Manag..

[17]  C. Chatmon Secure Anonymous RFID Authentication Protocols , 2022 .

[18]  Laurent Gomez,et al.  Dynamic Risk Assessment by Communicating Objects in Supply Chain of Chemicals , 2013, Int. J. Appl. Logist..

[19]  Xiaowen Zhang,et al.  Enhancements to a Lightweight RFID Authentication Protocol , 2009, 2009 IEEE International Conference on e-Business Engineering.

[20]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[21]  M. Goh,et al.  The Internationalization Path of Wanxiang , 2012 .

[22]  Manjunath Ramachandra Web-based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission , 2009 .

[23]  Erwin Fielt,et al.  Analyzing Requirements and Approaches for Sourcing Software Based Services , 2010, Int. J. Appl. Logist..

[24]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[25]  Brent Morris Magic Tricks, Card Shuffling and Dynamic Computer Memories , 1998 .

[26]  Gonzalo Mejia,et al.  Optimal Solutions for a Multi-Product, Multi-Echelon Production and Replenishment System , 2009, Int. J. Inf. Syst. Supply Chain Manag..

[27]  Hing Kai Chan,et al.  Research Framework for Analyzing the Relationship Between Greening of Suppliers and Green Innovation on Firms' Performance , 2012, Int. J. Appl. Logist..

[28]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.