Skip to main content

Lightweight Anonymous RFID Authentication

  • Chapter
  • First Online:
RFID Technologies for Internet of Things

Part of the book series: Wireless Networks ((WN))

  • 1905 Accesses

Abstract

This chapter describes on lightweight RFID anonymous authentication. The widespread use of RFID tags raises a privacy concern: They make their carriers trackable. To protect the privacy of the tag carriers, we need to invent new mechanisms that keep the usefulness of tags while doing so anonymously. Many tag applications such as toll payment require authentication. Since low-cost tags have extremely limited hardware resource, an asymmetric design principle is adopted to push most complexity to more powerful RFID readers. Instead of implementing complicated and hardware-intensive cryptographic hash functions, our authentication protocol only requires tags to perform several simple and hardware-efficient operations to generate dynamic tokens for anonymous authentication. The theoretic analysis and randomness tests demonstrate that our protocol can ensure the privacy of the tags. Moreover, our protocol reduces the communication overhead and online computation overhead to O(1) per authentication for both tags and readers, which compares favorably with the prior art.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    An exponentially increasing timeout period can be enforced between unsuccessful authentications to prevent an adversary from depleting the k tokens too quickly.

References

  1. Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: IEEE PerCom Workshops, pp. 110–114 (2005)

    Google Scholar 

  2. Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. In: Selected Areas in Cryptography, pp. 291–306. Springer, Berlin/Heidelberg (2006)

    Google Scholar 

  3. Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Proceedings of CHES, pp. 283–299 (2008)

    Google Scholar 

  4. Chen, M., Chen, S., Xiao, Q.: Pandaka: a lightweight cipher for RFID systems. In: Proceedings of IEEE INFOCOM, pp. 172–180 (2014)

    Google Scholar 

  5. Chisvin, L., Duckworth, R.J.: Content-addressable and associative memory: alternatives to the ubiquitous RAM. IEEE Comput. 22, 51–64 (1989)

    Article  Google Scholar 

  6. Dimitriou, T.: A secure and efficient RFID protocol that could make big brother (partially) obsolete. In: Proceedings of IEEE PERCOM (2006)

    Book  Google Scholar 

  7. EPC Radio-Frequency Identity Protocols Class-1 Gen-2 UHF RFID Protocol for Communications at 860MHz-960MHz, EPCglobal (2011). Available at http://www.epcglobalinc.org/uhfclg2

  8. High Memory On Metal UHF RFID Tags: Available at http://www.oatsystems.com/OAT_Xerafy_RFID_Aerospace_2013/media/High-Memory-Tag-Guide.pdf

  9. Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: IEEE PerCom Workshops, pp. 342–347 (2007)

    Google Scholar 

  10. Li, T., Luo, W., Mo, Z., Chen, S.: Privacy-preserving RFID authentication based on cryptographical encoding. In: Proceedings of IEEE INFOCOM (2012)

    Google Scholar 

  11. Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.: Dynamic key-updating: privacy-preserving authentication for RFID systems. In: Proceedings of IEEE PERCOM (2007)

    Google Scholar 

  12. Lu, L., Han, J., Xiao, R., Liu, Y.: ACTION: breaking the privacy barrier for RFID systems. In: Proceedings of IEEE INFOCOM (2009)

    Google Scholar 

  13. Lu, L., Liu, Y., Li, X.: Refresh: weak privacy model for RFID systems. In: Proceedings of IEEE INFOCOM (2010)

    Google Scholar 

  14. Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: ICUCU, Workshop Privacy (2004)

    Google Scholar 

  15. Pais, S., Symonds, J.: Data storage on a RFID tag for a distributed system. Int. J. UbiComp. 2 (2), 26–39 (2011)

    Article  Google Scholar 

  16. Ranasinghe, D.C., Cole, P.H.: An evaluation framework. In: Networked RFID Systems and Lightweight Cryptography, Chap. 8 Springer, Berlin (2008)

    Google Scholar 

  17. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S. III, L.E.B.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology, Gaithersburg, MD (2010)

    Google Scholar 

  18. Singular Value Decomposition: Available at http://en.wikipedia.org/wiki/Singular_value_decomposition

  19. Tsudik, G.: Ya-trap: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of IEEE PerCom (2006)

    Google Scholar 

  20. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems. Lecture Notes in Computer Science. Springer, New York (2004)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this chapter

Cite this chapter

Chen, M., Chen, S. (2016). Lightweight Anonymous RFID Authentication. In: RFID Technologies for Internet of Things. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-47355-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47355-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47354-3

  • Online ISBN: 978-3-319-47355-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics