CFP last date
20 January 2025
Reseach Article

An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags

by R.K.Pateriya, Sangeeta Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 10
Year of Publication: 2011
Authors: R.K.Pateriya, Sangeeta Sharma
10.5120/3148-4352

R.K.Pateriya, Sangeeta Sharma . An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags. International Journal of Computer Applications. 25, 10 ( July 2011), 28-35. DOI=10.5120/3148-4352

@article{ 10.5120/3148-4352,
author = { R.K.Pateriya, Sangeeta Sharma },
title = { An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 10 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 28-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number10/3148-4352/ },
doi = { 10.5120/3148-4352 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:27.044615+05:30
%A R.K.Pateriya
%A Sangeeta Sharma
%T An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 10
%P 28-35
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

RFID (Radio Frequency identification) is emerging as an important tool in the field of Automatic Identification Technologies. The universal deployment of RFID devices may expose new security and privacy risks. These risks are the main obstacle for successful deployment of RFID tags. Since, the traditional cryptographic approach is not suitable for the RFID tags due to its limited computation resources and small storage capacity. This paper proposes an effective and efficient ultralightweight mutual authentication protocol, to achieve stronger security and privacy by using only simple bitwise operations (e.g. XOR, modulus addition). The proposed protocol is inspired by the Gossamer protocol of ultralightweight protocol family and by using its existing Rotation and Mixbit function. The proposed protocol provides better solution for security and privacy risk as compared with Gossamer and other relevant protocols. The comparative security and performance analysis shows that proposed protocol provides better security and privacy from the other solutions as well as reduces the computation, communication and storage cost.

References
  1. Kamran Ahsan, Hanifa shah, Paul Kingston “RFID Applications: An Introductory and Exploratory study,” IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010.
  2. Juels, “RFID security and privacy: A research survey,” IEEE Journal on Selected Areas in Communication, vol. 24, no.2, pp.381– 394, February 2006.
  3. Dong-Her Shih Chin-Yi Lin Binshan Lin“ Privacy and Security Aspects of RFID Tags,” International Journal of Mobile Communications - Vol. 3, No 3 pp. 214 – 230, 2005.
  4. He Lei,Lu Xin-mei,Jin Song-he,Cai Zeng-yu “A one-way Hash based low-cost authentication protocol with forward security in RFID system ,” in Proc. 2nd International Asia Conference on , Informatics in Control, Automation and Robotics (CAR), 2010, pp. 269 – 272.
  5. Yonghao Gu, Weiming Wu “Mutual authentication protocol based on tag ID number updating for low-cost RFID,” in proc. IEEE International Conference on Network Infrastructure and Digital Content, 2009, pp. 548 – 551.
  6. Shemaili, M.A.B., Chan Yeob Yeun, Zemerly, M.J. “RFID lightweight mutual authentication using shrinking generator,” in Proc. International Conference for Internet Technology and Secured Transactions, 2009. ICITST 2009, pp. 1 – 6.
  7. P. Peris-Lopez, J. C. H. Castro, J. M. Est´evez-Tapiador, and A. Ribagorda, “M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags,” in Proc. UIC, 2006, pp. 912–923.
  8. M. B´ar´asz, B. Boros, P. Ligeti, K. L´oja, and D. Nagy, “Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags,” in Proc. First International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007.
  9. P. Peris-lopez, J. C. Hern, J. M. E. Tapiador, and A. Ribagorda, “LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags,” in Proc. 2nd Workshop on RFID Security. Ecrypt, 2006, ,p. 06.
  10. M. Barasz, B. Boros, P. Ligeti, K. Loja, and D. Nagy, “Breaking LMAP,” in Proc. Conference on RFID Security, Malaga, Spain, July 2007.
  11. P. Peris-lopez, J. C. Hern, J. M. Estevez-tapiador, and A. Ribagorda, “EMAP: An efficient mutual authentication protocol for low-cost RFID tags,” in Proc. OTM Federated Conferences and Workshop: IS Workshop. Springer-Verlag, 2006, pp. 352–361.
  12. T. Li and R. Deng, “Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol,” in Proc. International Conference on Availability, Reliability and Security, 2007, pp. 238–245.
  13. H.-Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp.337–340, 2007.
  14. T. Cao, E. Bertino, and H. Lei, “Security Analysis of the SASI Protocol,” IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 1, pp. 73–77, 2009.
  15. H.-M. Sun, W.-C. Ting, and K.-H. Wang, “On the Security of Chien’s Ultralightweight RFID Authentication Protocol,” Cryptology ePrint Archive, Report 2008/083, 2008, http://eprint.iacr.org/.
  16. Peris-Lopez, Pedro, Hernandez-Castro, J. Cesar, Estevez-Tapiador, J. M., Ribagorda, and Arturo, “Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol,” in Proc. Workshop on Information Security Applications, ser. Lecture Notes in Computer Science. Jeju Island, Korea: Springer-Verlag, Sept. 2008.
  17. Bilal, Masood and Kausar “Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protoco,l” 2 International Conference on Network-Based Information Systems, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Traceability Applicability Ultra-lightweight protocol privacy radio frequency identification (RFID) security active attacks denial of service de-synchronization