scispace - formally typeset
Journal ArticleDOI

Lightweight RFID authentication with forward and backward security

Reads0
Chats0
TLDR
A lightweight RFID authentication protocol that supports forward and backward security and uses a pseudorandom number generator (PRNG) that is shared with the backend Server.
Abstract
We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG. The lookup time is constant, and the protocol can be easily adapted to prevent online man-in-the-middle relay attacks. Security is proven in the UC security framework.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Cryptanalytic attacks on pseudorandom number generators

TL;DR: In this paper, the authors argue that PRNGs are their own unique type of cryptographic primitive, and should be analyzed as such, and demonstrate the applicability of the model (and their attacks) to four real-world PRNG models.
Posted Content

Provably Secure Grouping-proofs for RFID tags.

TL;DR: In this article, the authors investigated the group scanning problem in strong adversarial models and presented a security model for this application and gave a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/or forward security properties.
Journal ArticleDOI

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

TL;DR: This paper proposes a grouping-proofs-based authentication protocol (GUPA) to address the security issue for multiple readers and tags simultaneous identification in distributed RFID systems and shows that GUPA has lower communication overhead and computation load.
Journal ArticleDOI

A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags

TL;DR: The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on low-cost passive tags and achieves EPC C1G2 compliance while meeting the security requirements.
Journal Article

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

TL;DR: In performance analysis, it is observed that the Zone Routing Protocol (ZRP) outperforms the other MANET routing protocols in terms of network performance and security for the proposed scheme and the probabilistic analysis proves that it is still possible to control outliers in the network despite the new inserted defenses with trust management and limited resources.
References
More filters
Journal ArticleDOI

Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection

TL;DR: This paper proposes a new authentication and encryption method that conforms to the EPC Class 1 Generation 2 standards to ensure RFID security between tags and readers and proves its feasibility for use in several applications.
Journal ArticleDOI

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification

TL;DR: This proposal of a new PRNG, named LAMED, which is compliant with the standards and successfully passes several batteries of very demanding randomness tests is affirm this is a realist proposal both conforming with the EPC-G1C2 standard, and suitable for low-cost RFIDs.
Posted Content

Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols.

TL;DR: This paper examines two unlinkably anonymous, simple RFID identification protocols that require only the ability to evaluate hash functions and generate random values, and that are provably secure against Byzantine adversaries, and arrives at a universally composable security model tuned for RFlD applications.
Journal ArticleDOI

Secure implementation of identification systems

TL;DR: It is demonstrated that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme, can be insecure if proper care is not taken with their implementation.
Proceedings ArticleDOI

New Light-Weight Crypto Algorithms for RFID

TL;DR: A light-weight implementation of DESL (DES lightweight extension), which requires 45% less chip size and 86% less clock cycles than the best AES implementations with regard to RFID applications is proposed.