A lightweight RFID authentication protocol with confidentiality and anonymity
Title | A lightweight RFID authentication protocol with confidentiality and anonymity |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Shi, Z., Chen, J., Chen, S., Ren, S. |
Conference Name | 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) |
Date Published | March 2017 |
Publisher | IEEE |
ISBN Number | 978-1-4673-8979-2 |
Keywords | authentication, CRC, cryptographic protocols, cryptography, DOS-attack prevention, eavesdropping prevention, Hash functions, Human Behavior, human factors, Internet of Things, lightweight RFID authentication protocol, location trace, low-cost passive tags, on-chip CRC function, open wireless radio wave, privacy, privacy and security, protocol, Protocols, pseudorandom number generator, pubcrawl, radiofrequency identification, random number generation, replay attack, Resiliency, RFID, RFID system, RFID tags, RFIDs, telecommunication security |
Abstract | Radio Frequency IDentification(RFID) is one of the most important sensing techniques for Internet of Things(IoT) and RFID systems have been applied to various different fields. But an RFID system usually uses open wireless radio wave to communicate and this will lead to a serious threat to its privacy and security. The current popular RFID tags are some low-cost passive tags. Their computation and storage resources are very limited. It is not feasible for them to complete some complicated cryptographic operations. So it is very difficult to protect the security and privacy of an RFID system. Lightweight authentication protocol is considered as an effective approach. Many typical authentication protocols usually use Hash functions so that they require more computation and storage resources. Based on CRC function, we propose a lightweight RFID authentication protocol, which needs less computation and storage resources than Hash functions. This protocol exploits an on-chip CRC function and a pseudorandom number generator to ensure the anonymity and freshness of communications between reader and tag. It provides forward security and confidential communication. It can prevent eavesdropping, location trace, replay attack, spoofing and DOS-attack effectively. It is very suitable to be applied to RFID systems. |
URL | https://ieeexplore.ieee.org/document/8054290/ |
DOI | 10.1109/IAEAC.2017.8054290 |
Citation Key | shi_lightweight_2017 |
- privacy
- telecommunication security
- RFIDs
- RFID tags
- RFID system
- RFID
- Resiliency
- replay attack
- random number generation
- radiofrequency identification
- pubcrawl
- pseudorandom number generator
- Protocols
- protocol
- privacy and security
- authentication
- open wireless radio wave
- on-chip CRC function
- low-cost passive tags
- location trace
- lightweight RFID authentication protocol
- Internet of Things
- Human Factors
- Human behavior
- Hash functions
- eavesdropping prevention
- DOS-attack prevention
- Cryptography
- Cryptographic Protocols
- CRC