TY - GEN
T1 - Ultralightweight RFID reader-tag mutual authentication
AU - Huang, Yu Chung
AU - Jiang, Jehn Ruey
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/9/21
Y1 - 2015/9/21
N2 - In the RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks, leading to privacy and security weakness. Typical attacks include the forged-tag, forged-server, man-in-the-middle (MitM), tracking, replay, forward secrecy and DoS attacks. Due to the extremely small memory and very limited computation power of tags, some security schemes, like Chien and Chen's scheme, Chen and Deng's scheme, have been proposed to resist these attacks by using ultra lightweight operations on tags, such as the random number generation (RNG), the pseudo random number generator (PRNG), the cyclic redundancy check (CRC), and the exclusive-or (XOR) operator. These schemes still have some flaws, though. In this article, we show two mutual authentication schemes using only ultra lightweight operations conforming to the EPC global Class 1 Generation 2 (EPC C1G2) standard to resist aforementioned attacks and reduce the communication and/or computation overheads. We show comparisons of the two schemes and other related ones, and also show some research directions on designing good RFID reader-tag mutual authentication schemes.
AB - In the RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks, leading to privacy and security weakness. Typical attacks include the forged-tag, forged-server, man-in-the-middle (MitM), tracking, replay, forward secrecy and DoS attacks. Due to the extremely small memory and very limited computation power of tags, some security schemes, like Chien and Chen's scheme, Chen and Deng's scheme, have been proposed to resist these attacks by using ultra lightweight operations on tags, such as the random number generation (RNG), the pseudo random number generator (PRNG), the cyclic redundancy check (CRC), and the exclusive-or (XOR) operator. These schemes still have some flaws, though. In this article, we show two mutual authentication schemes using only ultra lightweight operations conforming to the EPC global Class 1 Generation 2 (EPC C1G2) standard to resist aforementioned attacks and reduce the communication and/or computation overheads. We show comparisons of the two schemes and other related ones, and also show some research directions on designing good RFID reader-tag mutual authentication schemes.
KW - Mutual Authentication
KW - Privacy
KW - Radio Frequency Identification (RFID)
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84962071129&partnerID=8YFLogxK
U2 - 10.1109/COMPSAC.2015.106
DO - 10.1109/COMPSAC.2015.106
M3 - 會議論文篇章
AN - SCOPUS:84962071129
T3 - Proceedings - International Computer Software and Applications Conference
SP - 613
EP - 616
BT - Proceedings - 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops, COMPSACW 2015
A2 - Ahamed, Sheikh Iqbal
A2 - Chang, Carl K.
A2 - Crnkovic, Ivica
A2 - Hsiung, Pao-Ann
A2 - Yang, Jingwei
A2 - Huang, Gang
A2 - Chu, William
PB - IEEE Computer Society
T2 - 39th IEEE Annual Computer Software and Applications Conference Workshops, COMPSACW 2015
Y2 - 1 July 2015 through 5 July 2015
ER -