Abstract
Providing security in low-cost RFID (Radio Frequency Identification) tag systems is a challenging task because low-cost tags cannot support strong cryptography which needs costly resources. Special lightweight algorithms and protocols need to be designed to take into account the tag constraints. In this paper, we propose a function and a protocol to ensure pre-shared key authentication.
Chapter PDF
Similar content being viewed by others
Keywords
References
Agarwal, A., Mitra, M.: RFID: Promises and Problems (April 2006)
Weis, S.A.: Rfid (radio frequency identification): Principles and applications
Nath, B., Reynolds, F., Want, R.: Rfid technology and applications. IEEE Pervasive Computing 5(1), 22–24 (2006)
Östman, H.: Rfid - 5 most common applications on the shop floor (2012), http://www.rfidarena.com/2012/12/13/rfid-%E2%80%93-5-most-common-applications-on-the-shop-floor.aspx
James, J.: Fda, companies test rfid tracking to prevent drug counterfeiting. AIDS Treat News (417), 5–8 (2005)
Miles, S., Sarma, S., Williams, J.: RFID Technology and Applications. Cambridge University Press (2011)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Feldhofer, M., Wolkerstorfer, J.: Strong crypto for rfid tags - a comparison of low-power hardware implementations. In: ISCAS, pp. 1839–1842. IEEE (2007)
Kömmerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcard processors. In: Proceedings of the USENIX Workshop on Smartcard Technology, p. 2. USENIX Association (1999)
Poschmann, A.: Lightweight cryptography - cryptographic engineering for a pervasive world. IACR Cryptology ePrint Archive 2009, 516 (2009)
Hellekalek, P.: Good random number generators are (not so) easy to find. Math. Comput. Simul. 46(5-6), 485–505 (1998)
NIST: Advanced encryption standard (aes), fips 197 (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Eastlake, D.E., Jones, P.E.: US Secure Hash Algorithm 1 (SHA1), http://www.ietf.org/rfc/rfc3174.txt?number=3174
Rivest, R.L.: The MD5 Message-Digest Algorithm (RFC 1321), http://www.ietf.org/rfc/rfc1321.txt?number=1321
Vajda, I., Buttyán, L.: Lightweight authentication protocols for low-cost rfid tags. In: 2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003 (October 2003)
Peris-Lopez, P., Hern, J.C., Tapiador, J.M.E., Ribagorda, A.: Lmap: A real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc. of 2nd Workshop on RFID Security, Ecrypt, p. 06 (2006)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912–923. Springer, Heidelberg (2006)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM Workshops 2006, Part I. LNCS, vol. 4277, pp. 352–361. Springer, Heidelberg (2006)
Defend, B., Fu, K., Juels, A.: Cryptanalysis of two lightweight rfid authentication schemes. In: PerCom Workshops, pp. 211–216. IEEE Computer Society (2007)
Li, T., Wang, G.: Security analysis of two ultra-lightweight RFID authentication protocols. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 109–120. Springer, Boston (2007)
Lee, J., Yeom, Y.: Efficient rfid authentication protocols based on pseudorandom sequence generators. IACR Cryptology ePrint Archive 2008, 343 (2008)
Lo, N.W., Yeh, K.H.: De-synchronization attack on rfid authentication protocols. In: International Symposium on Information Theory and its Applications (ISITA), pp. 566–570 (October 2010)
van Deursen, T., Radomirovic, S.: Security of rfid protocols - a case study. Electr. Notes Theor. Comput. Sci. 244, 41–52 (2009)
Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26. IEEE (2011)
Yeh, T.C., Wang, Y.J., Kuo, T.C., Wang, S.S.: Securing rfid systems conforming to epc class 1 generation 2 standard. Expert Syst. Appl. 37(12), 7678–7683 (2010)
Habibi, M.H., Alagheband, M.R., Aref, M.R.: Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 254–263. Springer, Heidelberg (2011)
Hernandez-Castro, J.C., Peris-Lopez, P., Safkhani, M., Bagheri, N., Naderi, M.: Another fallen hash-based RFID authentication protocol. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 29–37. Springer, Heidelberg (2012)
Song, B., Hwang, J.Y., Shim, K.A.: Security improvement of an rfid security protocol of iso/iec wd 29167-6. IEEE Communications Letters 15(12), 1375–1377 (2011)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer (2002)
Intel: Mcs-51 instruction set summary (1979)
Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power aes encryption hardware core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD 2006, pp. 577–583. IEEE Computer Society, Washington, DC (2006)
Forré, R.: The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 450–468. Springer, Heidelberg (1990)
Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 523–534. Springer, Heidelberg (1986)
NIST: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. NIST Special Publication 800-22rev1a (April 2010)
Multos: Multos developer’s guide (2012)
Kasper, T., Carluccio, D., Paar, C.: An embedded system for practical security analysis of contactless smartcards. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 150–160. Springer, Heidelberg (2007)
Schneier, B.: Rfid cards and man-in-the-middle attacks. Schneier Security Blog (2006)
Hancke, G.P., Kuhn, M.G.: An rfid distance bounding protocol. In: SecureComm, pp. 67–73. IEEE (2005)
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dusart, P., Traoré, S. (2013). Lightweight Authentication Protocol for Low-Cost RFID Tags. In: Cavallaro, L., Gollmann, D. (eds) Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems. WISTP 2013. Lecture Notes in Computer Science, vol 7886. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38530-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-38530-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38529-2
Online ISBN: 978-3-642-38530-8
eBook Packages: Computer ScienceComputer Science (R0)