IJMECS Vol. 6, No. 1, 8 Jan. 2014
Cover page and Table of Contents: PDF (size: 1036KB)
Full Text (PDF, 1036KB), PP.17-24
Views: 0 Downloads: 0
RFID, Mutual Authentication, Security, Encryption, Public key
Radio Frequency Identification (RFID) is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because it is believed to increasing security is inconsistent with the simplicity, the researchers mostly use one-way encryption methods. In this paper, we propose a mutual authentication protocol based on public key cryptography. The used encryption method includes high security and low complexity. This protocol performs in few steps and is suitable for portable devices with power limitation. In terms of security, the proposed protocol is robust against known attacks. In addition, we prove the protocol is secure by an analytical method.
Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hosseinzadeh, "A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security", International Journal of Modern Education and Computer Science (IJMECS), vol.6, no.1, pp.17-24, 2014. DOI:10.5815/ijmecs.2014.01.02
[1]Y. Tian, G. Chen, J. Li. A new ultralightweight RFID authentication protocol with permutation, IEEE Communications Letters, 2012, 16 (5), pp702–705.
[2]G. Avoine, X. Carpent, Yet another ultralightweight authenticationprotocol that is broken, in pre-proceeding of RFIDsec, 2012.
[3]W. Shao-hui, H. Zhijie, L. Sujuan, C. Dan-wei, Security analysis of RAPP an RFID authentication protocol based on permutation, Cryptology ePrint Archive, Report 2012/327, 2012.
[4]Z.Ahmadian, M.Salmasizadeh, M.R. Aref Desynchronization attack on RAPP ultra-lightweight authentication protocol, Information Processing Letters, 2013, 113, pp 205–209.
[5]Zhu Zhong Qian, Ce Chen, Ilsun You, Sanglu Lu. ACSP: a novel security protocol against counting attack for UHF RFID systems, Computers & Mathematics with Applications, 2012, 63 (2), pp 492–500.
[6]M. Safkhani et al., on the security of RFID anti-counting security protocol (ACSP), Journal of Computational and Applied Mathematics, 2013.
[7]M. Konidala, Z. Kim, and K. Kim, A simple and cost effective RFID tag–reader mutual authentication scheme, in Proc. Int. Conf. RFIDSec, Jul. 2007, pp. 141–152.
[8]Y.Huang, W.Lin, and H.Li, Efficient Implementation of RFID Mutual Authentication Protocol, IEEE Transactions on Industrial Electronics, Vol. 59, No. 12, Dec 2012.
[9]J.Cho, S.Yeo, S.Kim, Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, Computer Communications, 34, 2011, pp 391–397.
[10]M. Ajtai. The shortest vector problem in L2 is NP-hard for randomized reductions, in Proceedings of the thirtieth annual ACM symposium on Theory of computing, 1998, Dallas, Texas, United States: ACM.
[11]Goldreich O, Micciancio D, Safra S, Seifert J.P, Approximating shortest lattice vectors is not harder than approximating closest lattice vectors. Inform. Process. Lett., vol 71, 1999, pp. 55–61.
[12]Hoffstein J, Pipher J, Silverman J.H, NTRU: A Ring Based Public Key Cryptosystem, in Algorithmic Number Theory (ANTS III), Portland, OR, June 1998, Lecture Notes in Computer Science 1423 (J.P. Buhler, ed.), Springer-Verlag, Berlin, 1998, pp.267-288.
[13]Michael Burrows, Martin Abadi, Roger Needham. A Logic of Authentication. DEC SRC, 1989, Research Report 39.
[14]Zhen Zhang, Shijie Zhou, Zongwei Luo. Design and Analysis for RFID Authentication Protocol, IEEE International Conference on e-Business Engineering, 2008, Xian, china.
[15]S. Han, V. Potgar, E. Chang, Mutual authentication protocol for RFID tags based on synchronized secret information with monitor, Proceedings of ICCSA, 4707, LNCS, 2007, pp. 227–238.
[16]C. Qingling, Z. Yiju, W. Yonghua, A minimalist mutual authentication protocol for RFID system and BAN logic analysis, ISECS International Colloquium on Computing, Communication, Control, and Management, 2008, pp. 449–453.
[17]Chen, C.-L., Deng, Y.-Y., 2009. Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence 22, 1284–1291.