ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Symmetric key-based lightweight authentication protocols for RFID security

Rajaguru, K and Hansdah, RC (2018) Symmetric key-based lightweight authentication protocols for RFID security. In: 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018, 16 - 18 May 2018, Krakow, pp. 488-495.

[img] PDF
IEEE_WAINA 2018_2018_488-495_2018.pdf - Published Version
Restricted to Registered users only

Download (179kB) | Request a copy
Official URL: https://doi.org/10.1109/WAINA.2018.00133

Abstract

Radio Frequency Identification (RFID) is being used in many industries from inventory tracking to human implants. However, there are many security issues in RFID systems. Many attacks like privacy related attacks, eavesdropping, replay attack, man-in-the-middle attack, de-synchronization attack, etc. are possible in RFID systems. Due to these security problems, an adversary can get important information which can be used to track the location of a person, steal information, etc. Many researchers have proposed protocols to cater for security. However, there are several drawbacks in existing protocols. For example, they do not support both active and passive tags. In many protocols, reader is not authenticated by server. Many protocols cannot be implemented in practice due to limitations in RFID tag computing ability. This motivated us to explore new protocols which can satisfy all security requirements of authentication protocols for RFID security at low cost. In this paper, we propose a suite of lightweight authentication protocols for RFID security which provide security against all known attacks. We have compared the security provided by the proposed protocols with those of the existing protocols, and shown that the proposed protocols meet most of the security requirements of authentication protocols for RFID security. Essentially, we propose two protocols with tag anonymity as an option. The first protocol ensures all security requirements at low cost. In the second and improved protocol, communication between server and reader is greatly reduced.

Item Type: Conference Paper
Publication: Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018
Publisher: Institute of Electrical and Electronics Engineers Inc.
Additional Information: The copyright for this article belongs to the Institute of Electrical and Electronics Engineers Inc.
Keywords: Authentication; Computer crime; Costs; Cryptography; Network security, Authentication protocols; Lightweight protocols; Mutual authentication; RFID security; Symmetric keys, Radio frequency identification (RFID)
Department/Centre: Division of Electrical Sciences > Computer Science & Automation
Date Deposited: 07 Aug 2022 08:58
Last Modified: 07 Aug 2022 08:58
URI: https://eprints.iisc.ac.in/id/eprint/75443

Actions (login required)

View Item View Item