Abstract
RFID is consider to be a common and useful tool in many applications, such as supply chain management, logistics, manufacturing, inventory control and so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysis of the protocol shows that it also satisfies the essential requirements of RFID systems, including tag anonymity, location privacy, forward security, resistance to replay attack and de-synchronization attack, and immunity to tag compromise attack. We also compare our protocol with previous works in terms of security and performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chien, H.Y.: Sasi: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337–340 (2007)
Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues for rfid systems. Comput. Netw. 52(12), 2373–2380 (2008)
Lee, Y.K. , Batina, L., Verbauwhede, I.: Ec-rac (ecdlp based randomized access control): provably secure rfid authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97–104. IEEE (2008)
Zhang, X., Li, L., Wu, Y., Zhang, Q.: An ecdlp-based randomized key rfid authentication protocol. In: 2011 International Conference on Network Computing and Information Security (NCIS), vol. 2, pp. 146–149. IEEE (2011)
Chien, H.Y.: Combining rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost rfid. Proc. SCIS 2004, 719–724 (2004)
Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M.: Dynamic key-updating: privacy-preserving authentication for rfid systems. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, pp. 13–22. IEEE (2007)
Lu, L., Han, J., Xiao, R., Liu, Y.: Action: breaking the privacy barrier for rfid systems. In: IEEE INFOCOM 2009, pp. 1953–1961. IEEE (2009)
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable rfid systems: a privacy-preserving protocol with constant-time identification. IEEE Trans. Parallel Distrib. Syst. 23(8), 1536–1550 (2012)
Chien, H.Y., Laih, C.S.: Ecc-based lightweight authentication protocol with untraceability for low-cost rfid. J. Parallel Distrib. Comput. 69(10), 848–853 (2009)
Liu, A.X., Bailey, L.A., Krishnamurthy, A.H.: Rfidguard: a lightweight privacy and authentication protocol for passive rfid tags. Secur. Commun. Netw. 3(5), 384–393 (2010)
Chen, C.M., Chen, S.M., Zheng, X., Chen, P.Y., Sun, H.M.: A secure rfid authentication protocol adopting error correction code. Sci. World J. 2014, 12 (2014)
Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)
Li, T., Deng, R.H., Wang, G.: The security and improvement of an ultra-lightweight rfid authentication protocol. Secur. Commun. Netw. 1(2), 135–146 (2008)
Sarma, S.E., Weis, S.A., Engels, D.: Radio-frequency-identification security risks and challenges. Cryptobytes 6(1), 2–9 (2003)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Molnar, D., Wagner, D.: Privacy and security in library rfid: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM (2004)
Dimitriou, T.: A secure and efficient rfid protocol that could make big brother (partially) obsolete. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, pp. 269–275. IEEE (2006)
Yao, Q., Qi, Y., Han, J., Zhao, J., Li, X., Liu, Y.: Randomizing rfid private authentication. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–10. IEEE (2009)
Li, T., Luo, W., Mo, Z., Chen, S.: Privacy-preserving rfid authentication based on cryptographical encoding. In: INFOCOM, 2012 Proceedings IEEE, pp. 2174–2182. IEEE (2012)
Liao, Y.P., Hsiao, C.M.: A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol. Ad Hoc Networks (2013)
Berlekamp, E.R., McEliece, R.J., Henk, C.A., Van, T.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theor. 24(3), 384–386 (1978)
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114–116 (1978)
Gaborit, P., Girault, M.: Lightweight code-based identification and signature. In: IEEE International Symposium on Information Theory, ISIT 2007, pp. 191–195. IEEE (2007)
Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.: Mdpc-mceliece: new mceliece variants from moderate density parity-check codes. In: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2069–2073. IEEE (2013)
von Maurich, I., Güneysu, T.: Lightweight code-based cryptography: qc-mdpc mceliece encryption on reconfigurable devices. In: Proceedings of the conference on Design, Automation & Test in Europe, p. 38. European Design and Automation Association (2014)
Sun, H.M., Ting, W.C., Wang, K.H.: On the security of chien’s ultralightweight rfid authentication protocol. IEEE Trans. Dependable Secure Comput. 2, 315–317 (2009)
Phan, R.W.: Cryptanalysis of a new ultralightweight rfid authentication protocolsasi. IEEE Trans. Dependable Secure Comput. 6(4), 316–320 (2009)
Chen, C.M., Chen, S.M., Zheng, X.Y., Yan, L., Wang, H., Sun, H.M.: Pitfalls in an ecc-based lightweight authentication protocol for low-cost rfid. J. Inf. Hiding Multimed. Signal Process. 5(4) (2014)
Gilbert, H., Robshaw, M., Sibert, H.: Active attack against hb+: a provably secure lightweight authentication protocol. Electronic. Lett. 41(21), 1169–1170 (2005)
Erguler, I.: A key recovery attack on error correcting code based a lightweight security protocol
Acknowledgments
This work was supported by National 863 project (Grant No. 2013AA014002) and Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA06010701).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Z., Zhang, W., Wu, C. (2015). A Lightweight Code-Based Authentication Protocol for RFID Systems. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-48683-2_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48682-5
Online ISBN: 978-3-662-48683-2
eBook Packages: Computer ScienceComputer Science (R0)