TY - JOUR
T1 - A strong lightweight authentication protocol for low-cost RFID systems
AU - Shi, Zhicai
AU - Pieprzyk, Josef
AU - Doche, Christophe
AU - Xia, Yongxiang
AU - Zhang, Yu
AU - Dai, Jian
PY - 2014
Y1 - 2014
N2 - RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag's identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.
AB - RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag's identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.
UR - http://www.scopus.com/inward/record.url?scp=84918786082&partnerID=8YFLogxK
U2 - 10.14257/ijsia.2014.8.6.20
DO - 10.14257/ijsia.2014.8.6.20
M3 - Article
AN - SCOPUS:84918786082
VL - 8
SP - 225
EP - 234
JO - International Journal of Security and its Applications
JF - International Journal of Security and its Applications
SN - 1738-9976
IS - 6
ER -