Secure RFID Authentication with Efficient Key-Lookup
- 1 November 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
In this paper, we analyze storage awareness RFID authentication protocol based on sparse tree structure (SAPA), which provides backward untraceability and reduces the space for storing key sequence. We discover that SAPA does not provide location and information privacy between successful authentication sessions and does not resist denial of service attacks, forward traceability, and server impersonation. We analyze the weaknesses of SAPA and propose a new RFID authentication protocol. The proposed protocol provides better protection against privacy and security threats than those before. Our proposed protocol provides tag information privacy and tag location privacy, and resists replay attacks, denial of service attacks, backward traceability, forward traceability (under an assumption), and server impersonation with an efficient keylookup. Furthermore, our protocol has the least computation and communication load on both the tag and the server side compared to other tree based protocols.Keywords
This publication has 11 references indexed in Scilit:
- RFID HandbookPublished by Informa UK Limited ,2017
- A new RFID authentication protocol with resistance to server impersonationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- RFID authentication protocol for low-cost tagsPublished by Association for Computing Machinery (ACM) ,2008
- Networked RFID Systems and Lightweight CryptographyPublished by Springer Science and Business Media LLC ,2008
- Storage-Awareness: RFID Private Authentication based on Sparse TreePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Dynamic Key-Updating: Privacy-Preserving Authentication for RFID SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- RFID security and privacy: a research surveyIEEE Journal on Selected Areas in Communications, 2006
- Strong and Robust RFID Authentication Enabling Perfect Ownership TransferLecture Notes in Computer Science, 2006
- A Scalable and Provably Secure Hash-Based RFID ProtocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A cryptanalytic time-memory trade-offIEEE Transactions on Information Theory, 1980