A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
Top Cited Papers
- 22 March 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or “smart” applications for users. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this work we present an RFID authentication protocol that enforces user privacy and protects against tag cloning. We designed our protocol with both tag-to-reader and reader-to-tag authentication in mind; unless both types of authentication are applied, any protocol can be shown to be prone to either cloning or privacy attacks. Our scheme is based on the use of a secret shared between tag and database that is refreshed to avoid tag tracing. However, this is done in such a way so that efficiency of identification is not sacrificed. Additionally, our protocol is very simple and it can be implemented easily with the use of standard cryptographic hash functions. In analyzing our protocol, we identify several attacks that can be applied to RFID protocols and we demonstrate the security of our scheme. Furthermore, we show how forward privacy is guaranteed; messages seen today will still be valid in the future, even after the tag has been compromised.Keywords
This publication has 7 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- A Scalable and Provably Secure Hash-Based RFID ProtocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- RFID Traceability: A Multilayer ProblemLecture Notes in Computer Science, 2005
- Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Selecting Cryptographic Key SizesLecture Notes in Computer Science, 2000
- Keying Hash Functions for Message AuthenticationLecture Notes in Computer Science, 1996
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996