scispace - formally typeset
Journal ArticleDOI

Lightweight RFID authentication with forward and backward security

Reads0
Chats0
TLDR
A lightweight RFID authentication protocol that supports forward and backward security and uses a pseudorandom number generator (PRNG) that is shared with the backend Server.
Abstract
We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG. The lookup time is constant, and the protocol can be easily adapted to prevent online man-in-the-middle relay attacks. Security is proven in the UC security framework.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Cryptanalytic attacks on pseudorandom number generators

TL;DR: In this paper, the authors argue that PRNGs are their own unique type of cryptographic primitive, and should be analyzed as such, and demonstrate the applicability of the model (and their attacks) to four real-world PRNG models.
Posted Content

Provably Secure Grouping-proofs for RFID tags.

TL;DR: In this article, the authors investigated the group scanning problem in strong adversarial models and presented a security model for this application and gave a formal description of the attending security requirements, focusing on the privacy (anonymity) of the grouped tags, and/or forward security properties.
Journal ArticleDOI

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

TL;DR: This paper proposes a grouping-proofs-based authentication protocol (GUPA) to address the security issue for multiple readers and tags simultaneous identification in distributed RFID systems and shows that GUPA has lower communication overhead and computation load.
Journal ArticleDOI

A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags

TL;DR: The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on low-cost passive tags and achieves EPC C1G2 compliance while meeting the security requirements.
Journal Article

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

TL;DR: In performance analysis, it is observed that the Zone Routing Protocol (ZRP) outperforms the other MANET routing protocols in terms of network performance and security for the proposed scheme and the probabilistic analysis proves that it is still possible to control outliers in the network despite the new inserted defenses with trust management and limited resources.
References
More filters
Book ChapterDOI

Provably Secure Grouping-Proofs for RFID Tags

TL;DR: This work investigates an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device, and presents a security model based on the Universal Composability framework, which supports re-usability and modularity of security guarantees.
Journal ArticleDOI

A Gen2-Based RFID Authentication Protocol for Security and Privacy

TL;DR: This paper proposes a novel authentication protocol based on Gen2, called Gen2+, and shows that Gen2+ is more secure under tracing and cloning attacks, and follows every message flow in Gen2 to provide backward compatibility.
Journal ArticleDOI

Universally Composable RFID Identification and Authentication Protocols

TL;DR: A universally composable security framework designed especially for RFID applications that supports modular deployment and a set of simple, efficient, secure, and anonymous RFID identification and authentication protocols that instantiate the proposed framework.
Journal ArticleDOI

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems

TL;DR: This paper proposes a novel anti-cloning method in accordance with the EPCglobal Class-1 Generation-2 (C1G2) standard that only uses functions that can be supported by the standard and abides by the communication flow of the standard.
Proceedings ArticleDOI

Robust, anonymous RFID authentication with constant key-lookup

TL;DR: In this article, the authors propose a compiler that transforms a generic RFID authentication protocol (supporting anonymity) into one that achieves the same guarantees with constant key-lookup cost even when the number of tags issued by the system is very large.