Skip to main content

A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

The RFID tags only have limited computing and memory resources. This makes it difficult to solve their security and privacy problems. Authentication is considered as an effective approach to protect the security and privacy of RFID systems. Based on Hash function and the randomization of the tag’s identifier, a lightweight authentication protocol is proposed. The protocol uses Hash function to ensure the anonymity and confidentiality of the RFID system. It uses a randomization function to randomize the tag’s identifier to enhance the difficulty to reveal the secrecy of the RFID system. Time stamp and pseudorandom number generator are combined to prevent replay attack. It also completes the strong authentication of the backend server to the tag by twice authentication. The analysis shows that this protocol provides forward security and it can prevent eavesdropping, tracing, replay and de-synchronize attack. The protocol only uses Hash function and pseudorandom number generator. It is very suitable to the low-cost RFID system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chen, M., Luo, W., Mo, Z., Chen, S., Fang, Y.: An efficient tag search protocol in large-scale RFID systems with noisy channel. IEEE/ACM Trans. Netw. 24(2), 703–716 (2016)

    Google Scholar 

  2. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006). doi:10.1007/11872153_14

    Chapter  Google Scholar 

  3. Chikouche, N., Cherif, F., Cayrel, P.-L.: Weaknesses in two RFID authentication weaknesses. In: El Hajji, S., et al. (eds.) C2SI 2015, LNCS, vol. 9084, pp. 162–172. Springer, Heidelberg (2015)

    Google Scholar 

  4. Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15497-3_1

    Chapter  Google Scholar 

  5. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212 (2003)

    Google Scholar 

  6. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “Privacy-Friendly” tags. In: RFID Privacy Workshop. MIT Press, Cambridge (2003)

    Google Scholar 

  7. Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security, Sendai, Japan, pp. 719–724 (2004)

    Google Scholar 

  8. Yeo, S.-S., Kim, S.K.: Scalable and flexible privacy protection scheme for RFID systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153–163. Springer, Heidelberg (2005). doi:10.1007/11601494_13

    Chapter  Google Scholar 

  9. Lee, Y.K., Verbauwhede, I.: Secure and low-cost RFID authentication protocols. In: Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, St. Louis, USA, pp. 1–5 (2005)

    Google Scholar 

  10. Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005). doi:10.1007/11424758_65

    Chapter  Google Scholar 

  11. Cho, J.-S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput. Commun. 34(3), 391–397 (2011)

    Google Scholar 

  12. Cho, J.-S., Jeong, Y.-S., Sang, O.-P.: Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Comput. Math. Appl. 3, 1–8 (2012)

    Google Scholar 

  13. Kim, H.: Desynchronization attack on hash-based RFID mutual authentication protocol. J. Secur. Eng. 9(4), 357–365 (2012)

    Google Scholar 

  14. Khedr, W.I.: SRFID: a hash-based secure scheme for low cost RFID systems. Egypt. Inf. J. 14, 89–98 (2013)

    Google Scholar 

  15. Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J.C., Bagheri, N.: Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259, 571–577 (2014)

    Google Scholar 

  16. Ha, J., Moon, S., Zhou, J., Ha, J.: A new formal proof model for RFID location privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267–281. Springer, Heidelberg (2008). doi:10.1007/978-3-540-88313-5_18

    Chapter  Google Scholar 

  17. Sun, D.-Z., Zhong, J.-D.: A hash-based RFID security protocol for strong privacy protection. IEEE Trans. Consum. Electron. 58(4), 1246–1252 (2012)

    Google Scholar 

  18. Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B.: Hash-based RFID mutual authentication protocol. Int. J. Secur. Appl. 7(3), 183–194 (2013)

    Google Scholar 

  19. Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: Spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23951-9_21

    Chapter  Google Scholar 

  20. Gao, S., Wang, H.: Forward private RFID authentication protocol based on universal hash function. J. Inf. Comput. Sci. 10(11), 3477–3488 (2013)

    Google Scholar 

Download references

Acknowledgments

We are appreciated to anonymous reviewers for their constructive suggestion to this paper. The relative work about this paper is supported by National Natural Science Foundation of China (No. 61272097).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhicai Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Shi, Z., Wu, F., Wang, C., Ren, S. (2016). A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics