An Authentication Protocol for RFID Tag and Its Simulation

نویسندگان

  • Shang-ping Wang
  • Qiao-mei Ma
  • Ya-ling Zhang
  • You-sheng Li
چکیده

RFID tag has limited calculation resources and small storage capacity, the wireless communication channel between RFID tag and reader is vulnerable to various malicious attacks. Aimed at these problems, a HMAC-based RFID lightweight authentication protocol is proposed in this paper, and some considerations about protocol implementation are made subsequently. In the new protocol, only the Hash function and XOR operation are used, so that the calculation capacity and storage space of RFID reader are utilized efficiently, the demand for the capacity of calculation and storage of tag are reduced. The protocol framework and the packet format are presented. The hardware implementation was done in Verilog HDL for an FPGA target device to get a fast prototype. The analysis of security and performance show that the new protocol can resist some malicious attacks, such as spoofing attack, replay attack, tracking, etc., and is suitable for low-cost RFID system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

A Strong Lightweight Authentication Protocol for Low-cost RFID Systems

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for ...

متن کامل

An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection

RFID authentication has raised many concerns about the security risks and privacy issues due to its lightweight authentication properties. Many research achievements in RFID focus on strengthening the entire RFID system and solving the security problems. Recently, a hashbased RFID security protocol with the intension of updating the identifier of the tag in both the reader side and the tag side...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JNW

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011