Abstract
RFID is widely used on mobile devices and makes it possible to take advantage of RFID system to complete mobile payment or merchandise information reading. However, the widespread use of RFID tags brings the possibility for various security risks and privacy problems. In addition, the storage space, processing capability and power supply of RFID tags are limited. In this paper, in order to reduce the computational cost we present an ultra-lightweight RFID authentication scheme, named ULRAS. ULRAS only uses Bit and XOR operations to prevent the DDOS attack. ULRAS uses sub-key and sub-index number into its key update process to achieve the forward security. Compared to the SASI protocol and the Gossamer protocol, ULRAS cost less computation and communication resources and have stronger security.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)
Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge device authentication: privacy and security enhanced RFID preserving business value and consumer convenience. In: Proceedings of PST 2004, pp. 89–101 2004
Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-Response based rfid authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Feldhofer, M.: An authentication protocol in a security layer for RFID smart tags. In: Proceedings of MEC 2004, pp. 59–762 (2004)
Saito, J., Sakurai, K.: Grouping proof for RFID tags. Adv. Inf. Networking Appl. 2, 621–624 (2005)
Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4, 337–340 (2007)
Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M., Ribagorda, A.: Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 56–68. Springer, Heidelberg (2009)
Cao, T., Bertino, E., Lei, H.: Security analysis of the SASI protocol. Dependable Secure Comput. 6(1), 73–77 (2009)
Bilal, Z., Masood, A., Kausar, F.: Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: gossamer protocol. In: Proceedings of NIS 2009, pp. 260–267 (2009)
YA-TRAP, T.G.: Yet another trivial RFID authentication protocol. In: Proceedings of PerCom 2006, pp. 632–643 (2006)
Khan, G.N., Zhu, G.: Secure RFID authentication protocol with key updating technique. In: Proceedings of ICCCN 2013, pp. 1–5 (2013)
Acknowledgment
This work has been financially supported by the National Natural Science Foundation of China (No. 61303216 and No. 61373172), the China Postdoctoral Science Foundation funded project (No.2013M542328), and National 111 Program of China B08038.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Fan, K., Ge, N., Gong, Y., Li, H., Su, R., Yang, Y. (2015). ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)