Skip to main content

ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

Abstract

RFID is widely used on mobile devices and makes it possible to take advantage of RFID system to complete mobile payment or merchandise information reading. However, the widespread use of RFID tags brings the possibility for various security risks and privacy problems. In addition, the storage space, processing capability and power supply of RFID tags are limited. In this paper, in order to reduce the computational cost we present an ultra-lightweight RFID authentication scheme, named ULRAS. ULRAS only uses Bit and XOR operations to prevent the DDOS attack. ULRAS uses sub-key and sub-index number into its key update process to achieve the forward security. Compared to the SASI protocol and the Gossamer protocol, ULRAS cost less computation and communication resources and have stronger security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  2. Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge device authentication: privacy and security enhanced RFID preserving business value and consumer convenience. In: Proceedings of PST 2004, pp. 89–101 2004

    Google Scholar 

  3. Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-Response based rfid authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Feldhofer, M.: An authentication protocol in a security layer for RFID smart tags. In: Proceedings of MEC 2004, pp. 59–762 (2004)

    Google Scholar 

  5. Saito, J., Sakurai, K.: Grouping proof for RFID tags. Adv. Inf. Networking Appl. 2, 621–624 (2005)

    Google Scholar 

  6. Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4, 337–340 (2007)

    Article  Google Scholar 

  7. Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 56–68. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Cao, T., Bertino, E., Lei, H.: Security analysis of the SASI protocol. Dependable Secure Comput. 6(1), 73–77 (2009)

    Article  Google Scholar 

  9. Bilal, Z., Masood, A., Kausar, F.: Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: gossamer protocol. In: Proceedings of NIS 2009, pp. 260–267 (2009)

    Google Scholar 

  10. YA-TRAP, T.G.: Yet another trivial RFID authentication protocol. In: Proceedings of PerCom 2006, pp. 632–643 (2006)

    Google Scholar 

  11. Khan, G.N., Zhu, G.: Secure RFID authentication protocol with key updating technique. In: Proceedings of ICCCN 2013, pp. 1–5 (2013)

    Google Scholar 

Download references

Acknowledgment

This work has been financially supported by the National Natural Science Foundation of China (No. 61303216 and No. 61373172), the China Postdoctoral Science Foundation funded project (No.2013M542328), and National 111 Program of China B08038.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y. (2015). ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics