Journal ArticleDOI
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
Robin Doss,Saravanan Sundaresan,Wanlei Zhou +2 more
- Vol. 11, Iss: 1, pp 383-396
TLDR
This scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications and achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions.Abstract:
In this paper we propose a novel approach to authentication and privacy in mobile RFID systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 specifications. Recently, Chen et al. (2008) [10] and Yeh et al. (2011) [11] have both proposed authentication schemes for RFID systems based on quadratic residues. However, these schemes are not suitable for implementation on low-cost passive RFID tags as they require the implementation of hash functions on the tags. Consequently, both of these current methods do not conform to the EPC Class-1 Gen-2 standard for passive RFID tags which from a security perspective requires tags to only implement cyclic redundancy checks (CRC) and pseudo-random number generators (PRNG) leaving about 2.5k-5k gates available for any other security operations. Further, due to secure channel assumptions both schemes are not suited for mobile/wireless reader applications. We present the collaborative authentication scheme suitable for mobile/wireless reader RFID systems where the security of the server-reader channel cannot be guaranteed. Our schemes achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions. Our scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications. Through detailed security analysis we show that the collaborative authentication scheme achieves the required security properties of tag anonymity, reader anonymity, reader privacy, tag untraceability and forward secrecy. In addition, it is resistant to replay, impersonation and desynchronisation attacks. We also show through strand space analysis that the proposed approach achieves the required properties of agreement, originality and secrecy between the tag and the server.read more
Citations
More filters
Journal ArticleDOI
Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol
TL;DR: This paper proposes a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes and shows strong security properties that are provided from the proposed authentication scheme.
Journal ArticleDOI
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
TL;DR: A novel RFID authentication protocol based on elliptic curve cryptography is designed, which is more resistant to a variety of attacks and that it has the best scalability, while maintaining competitive levels of efficiency.
Journal ArticleDOI
A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem
TL;DR: Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao’s protocol but also has the same performance, therefore, it is more suitable for healthcare environments.
Journal ArticleDOI
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
TL;DR: This paper presents a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety and has better performance in terms of computational cost and communication overhead.
Journal ArticleDOI
Secure Tag Search in RFID Systems Using Mobile Readers
TL;DR: This work aims to fill the gap in secure search area of RFID by proposing a protocol that is based on simple XOR encryption and 128 bit pseudo random number generators (PRNG), operations that can be easily implemented on low-cost passive tags.
References
More filters
Journal ArticleDOI
RFID security and privacy: a research survey
TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Book ChapterDOI
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Book ChapterDOI
Authenticating pervasive devices with human protocols
Ari Juels,Stephen A. Weis +1 more
TL;DR: This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Proceedings ArticleDOI
Privacy and security in library RFID: issues, practices, and architectures
David Molnar,David Wagner +1 more
TL;DR: Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.
Journal ArticleDOI
RFID: a technical overview and its application to the enterprise
TL;DR: An RFID tutorial that answers the following questions: what is RFID, and how does it work, and what are some applications of RFID?
Related Papers (5)
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
Yi-Pin Liao,Chih-Ming Hsiao +1 more