An Efficient Lightweight RFID Authentication Protocol for Low-cost Tags

Wireless communication, signal broadcasting, strictly limited resources in tags make RFID systems being confronted with many security attacks and privacy disclosure threats. In this paper,an efficient lightweight RFID mutual authentication protocol is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the backend server and is particularly suitable for the low-cost RFID systems because only one-way hash function, XOR operation and concatenation operation are needed in tags. The security and performance of this protocol are analyzed as well by comparing with the related RFID authentication protocols.

[1]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.

[3]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[4]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[5]  Andre B. Bondi,et al.  Characteristics of scalability and their impact on performance , 2000, WOSP '00.

[6]  Y.-C. Lee,et al.  An Improvement on RFID Authentication Protocol with Privacy Protection , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[7]  Chris J. Mitchell,et al.  Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..

[8]  Ya-ling Zhang,et al.  An Authentication Protocol for RFID Tag and Its Simulation , 2011, J. Networks.

[9]  Ruchuan Wang,et al.  A Novel RFID Reader System Framework based on Peer-to-Peer Network , 2011 .

[10]  Yong,et al.  Study on RFID Authentication Protocol Theory , 2011 .

[11]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[12]  Yuanbo Guo,et al.  Security Improvement in Authentication Protocol for Gen-2 Based RFID System , 2011 .

[13]  Dongho Won,et al.  Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.

[14]  Lin Huo,et al.  Research on Hash-Based Low-Cost RFID Security Authentication Protocol , 2013 .