Abstract
The RFID tags only have limited computing and memory resources. This makes it difficult to solve their security and privacy problems. Authentication is considered as an effective approach to protect the security and privacy of RFID systems. Based on Hash function and the randomization of the tag’s identifier, a lightweight authentication protocol is proposed. The protocol uses Hash function to ensure the anonymity and confidentiality of the RFID system. It uses a randomization function to randomize the tag’s identifier to enhance the difficulty to reveal the secrecy of the RFID system. Time stamp and pseudorandom number generator are combined to prevent replay attack. It also completes the strong authentication of the backend server to the tag by twice authentication. The analysis shows that this protocol provides forward security and it can prevent eavesdropping, tracing, replay and de-synchronize attack. The protocol only uses Hash function and pseudorandom number generator. It is very suitable to the low-cost RFID system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chen, M., Luo, W., Mo, Z., Chen, S., Fang, Y.: An efficient tag search protocol in large-scale RFID systems with noisy channel. IEEE/ACM Trans. Netw. 24(2), 703–716 (2016)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006). doi:10.1007/11872153_14
Chikouche, N., Cherif, F., Cayrel, P.-L.: Weaknesses in two RFID authentication weaknesses. In: El Hajji, S., et al. (eds.) C2SI 2015, LNCS, vol. 9084, pp. 162–172. Springer, Heidelberg (2015)
Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_1
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212 (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “Privacy-Friendly” tags. In: RFID Privacy Workshop. MIT Press, Cambridge (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security, Sendai, Japan, pp. 719–724 (2004)
Yeo, S.-S., Kim, S.K.: Scalable and flexible privacy protection scheme for RFID systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153–163. Springer, Heidelberg (2005). doi:10.1007/11601494_13
Lee, Y.K., Verbauwhede, I.: Secure and low-cost RFID authentication protocols. In: Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, St. Louis, USA, pp. 1–5 (2005)
Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005). doi:10.1007/11424758_65
Cho, J.-S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)
Cho, J.-S., Jeong, Y.-S., Sang, O.-P.: Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math. Appl. 3, 1–8 (2012)
Kim, H.: Desynchronization attack on hash-based RFID mutual authentication protocol. J. Secur. Eng. 9(4), 357–365 (2012)
Khedr, W.I.: SRFID: a hash-based secure scheme for low cost RFID systems. Egypt. Inf. J. 14, 89–98 (2013)
Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J.C., Bagheri, N.: Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259, 571–577 (2014)
Ha, J., Moon, S., Zhou, J., Ha, J.: A new formal proof model for RFID location privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267–281. Springer, Heidelberg (2008). doi:10.1007/978-3-540-88313-5_18
Sun, D.-Z., Zhong, J.-D.: A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012)
Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B.: Hash-based RFID mutual authentication protocol. Int. J. Secur. Appl. 7(3), 183–194 (2013)
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: Spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23951-9_21
Gao, S., Wang, H.: Forward private RFID authentication protocol based on universal hash function. J. Inf. Comput. Sci. 10(11), 3477–3488 (2013)
Acknowledgments
We are appreciated to anonymous reviewers for their constructive suggestion to this paper. The relative work about this paper is supported by National Natural Science Foundation of China (No. 61272097).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Shi, Z., Wu, F., Wang, C., Ren, S. (2016). A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-49148-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49147-9
Online ISBN: 978-3-319-49148-6
eBook Packages: Computer ScienceComputer Science (R0)