scispace - formally typeset
Journal ArticleDOI

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

Robin Doss, +2 more
- Vol. 11, Iss: 1, pp 383-396
TLDR
This scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications and achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions.
Abstract
In this paper we propose a novel approach to authentication and privacy in mobile RFID systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 specifications. Recently, Chen et al. (2008) [10] and Yeh et al. (2011) [11] have both proposed authentication schemes for RFID systems based on quadratic residues. However, these schemes are not suitable for implementation on low-cost passive RFID tags as they require the implementation of hash functions on the tags. Consequently, both of these current methods do not conform to the EPC Class-1 Gen-2 standard for passive RFID tags which from a security perspective requires tags to only implement cyclic redundancy checks (CRC) and pseudo-random number generators (PRNG) leaving about 2.5k-5k gates available for any other security operations. Further, due to secure channel assumptions both schemes are not suited for mobile/wireless reader applications. We present the collaborative authentication scheme suitable for mobile/wireless reader RFID systems where the security of the server-reader channel cannot be guaranteed. Our schemes achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions. Our scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications. Through detailed security analysis we show that the collaborative authentication scheme achieves the required security properties of tag anonymity, reader anonymity, reader privacy, tag untraceability and forward secrecy. In addition, it is resistant to replay, impersonation and desynchronisation attacks. We also show through strand space analysis that the proposed approach achieves the required properties of agreement, originality and secrecy between the tag and the server.

read more

Citations
More filters
Journal ArticleDOI

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol

TL;DR: This paper proposes a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes and shows strong security properties that are provided from the proposed authentication scheme.
Journal ArticleDOI

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

TL;DR: A novel RFID authentication protocol based on elliptic curve cryptography is designed, which is more resistant to a variety of attacks and that it has the best scalability, while maintaining competitive levels of efficiency.
Journal ArticleDOI

A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem

TL;DR: Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao’s protocol but also has the same performance, therefore, it is more suitable for healthcare environments.
Journal ArticleDOI

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety

TL;DR: This paper presents a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety and has better performance in terms of computational cost and communication overhead.
Journal ArticleDOI

Secure Tag Search in RFID Systems Using Mobile Readers

TL;DR: This work aims to fill the gap in secure search area of RFID by proposing a protocol that is based on simple XOR encryption and 128 bit pseudo random number generators (PRNG), operations that can be easily implemented on low-cost passive tags.
References
More filters
Journal ArticleDOI

RFID security and privacy: a research survey

TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Book ChapterDOI

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Book ChapterDOI

Authenticating pervasive devices with human protocols

TL;DR: This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Proceedings ArticleDOI

Privacy and security in library RFID: issues, practices, and architectures

TL;DR: Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.
Journal ArticleDOI

RFID: a technical overview and its application to the enterprise

TL;DR: An RFID tutorial that answers the following questions: what is RFID, and how does it work, and what are some applications of RFID?
Related Papers (5)