Abstract
The OSK/AO protocol has already demonstrated how the application of time-memory trade-off (TMTO) increases the efficiency of a hash chain-based RFID protocol. The complexity of this protocol, both in the preparatory phase and in the tag identification, is greatly influenced by chain generation procedure. Since the hash values in chain nodes are generated independently and randomly, the repetition of the same calculations impairs the protocol efficiency. This paper proposes an improved procedure for a faster chain generation by employing a special table with equidistant states from the tag state space. It provides that hash functions calculations for a node start not from the beginning but from a nearest state stored in the table. Consequently, the number of repeated hash calculations is significantly reduced. After the new OSK/TMTO2 protocol is precisely formalized, a complexity analysis is carried out with detailed consideration of two cases (with and without additional memory for the table). A comparison of the proposed protocol with OSK/AO is also conducted. The practical restrictions on configuration of an RFID system with the new protocol are stated as well. Finally, the conducted analysis is illustrated by numerous examples with wide spectrum of relevant parameter values.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-019-06417-8/MediaObjects/11277_2019_6417_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-019-06417-8/MediaObjects/11277_2019_6417_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-019-06417-8/MediaObjects/11277_2019_6417_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-019-06417-8/MediaObjects/11277_2019_6417_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-019-06417-8/MediaObjects/11277_2019_6417_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-019-06417-8/MediaObjects/11277_2019_6417_Fig6_HTML.png)
Similar content being viewed by others
References
Kaur, M., Sandhu, M., Mohan, N., & Sandhu, P. (2011). RFID technology principles, advantages, limitations & its applications. International Journal of Computer and Electrical Engineering, 3(1), 151–157.
Jung, K., & Lee, S. (2015). A systematic review of RFID applications and diffusion: Key areas and public policy issues. Journal of Open Innovation: Technology, Market and Complexity. https://doi.org/10.1186/s40852-015-0010-z.
Valero, E., Adan, A., & Cerrada, C. (2015). Evolution of RFID applications in constructions: A literature review. Sensors, 15(7), 15988–16008.
Wang, K., Chen, C., Fang, W., & Wu, T. (2018). On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. The Journal of Supercomputing, 74(1), 65–70.
Fan, K., Jiang, W., Li, H., & Yang, Y. (2018). Lightweight RFID protocol for medical privacy protection in IoT. IEEE Transactions on Industrial Informatics, 14(4), 1656–1665.
Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47–59.
Wu, F., Xu, L., Kumari, S., Li, X., Das, A., & Shen, J. (2018). A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. Journal of Ambient Intelligence and Humanized Computing, 9(4), 919–930.
Nohara, Y., Inoue, S., & Yasuura, H. (2008). A secure high-speed identification scheme for RFID using bloom filters. International Conference on Availability, Reliability and Security. https://doi.org/10.1109/ARES.2008.83.
Liu, G., Zhang, H., Kong, F., & Zhang, L. (2018). A novel authentication management RFID protocol based on elliptic curve cryptography. Wireless Personal Communications, 101(3), 1445–1455.
Wu, J., & Stinson, D. (2009). A highly scalable RFID authentication protocol. Information Security and Privacy, 5594, 360–376.
Chang, J., & Wu, H. (2016). On constant-time-identification and privacy-preserving RFID protocols: Trade-off between time and memory. Journal of Information Science & Engineering, 32(4), 887–901.
Khattab, A., Jeddi, Z., Amini, E., & Bayoumi, M. (2017). RFID security: A lightweight paradigm, ch.2: RFID security threats and basic solutions. Cham: Springer.
Zhuang, X., Zhu, Y., Chang, C., & Peng, Q. (2018). Security issues in ultralightweight RFID authentication protocols. Wireless Personal Communications, 98(1), 779–814.
Syamsuddin, I., Dillon, T., Chang, E., & Han, S. (2008). A survey of RFID authentication protocols based on hash-chain method. International Conference on Convergence and Hybrid Information Technology. https://doi.org/10.1109/iccit.2008.314.
Yang, L., Yu, P., Bailing, W., Yun, Q., Xuefeng, B., Xinling, Y., et al. (2013). Hash-based RFID mutual authentication protocol. International Journal of Security and its Applications, 7(3), 183–194.
Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to “Privacy-Friendly” tags. In RFID privacy workshop, MIT.
Martin, T. (2013). Privacy in RFID Systems. Ph.D. Thesis. Universite catholique de Louvain, Belgium.
Garcia, F., & Rossum, P. (2010). Modeling privacy for off-line RFID systems. International Conference on Smart Card Research and Advanced Applications, 6035, 194–208.
Hellman, M. (1980). A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory, 4, 401–406.
Tomašević, V., & Tomašević, M. (2013). An analysis of chain characteristics in the cryptanalytic TMTO method. Theoretical Computer Science, 501, 52–61.
Avoine, G., & Oechslin, P. (2005). A scalable and provably secure hash-based RFID protocol. In IEEE International conference on pervasive computing and communications (pp. 110–114).
Avoine, G., Dysli, E., & Oechslin, P. (2005). Reducing time complexity in RFID systems. Selected Areas in Cryptography, 3897, 291–306.
Avoine, G., Bingol, A., Carpent, X., & Yalcin, S. (2012). Privacy-friendly authentication in RFID systems: On sub-linear protocols based on symmetric-key cryptography. IEEE Transactions on Mobile Computing, 99, 2037–2049.
Juels, A., & Weis, S. (2007). Defining strong privacy for RFID. In IEEE international conference on pervasive computing and communications (pp. 342–347).
Avoine, G., Bingol, A., Carpent, X., & Kardas, S. (2013). Deploying OSK on low-resource mobile devices. Radio Frequency Identification, 8262, 3–18.
Oechslin, P. (2003). Making a faster cryptanalytic time-memory trade-off. Advances in Cryptology, 2729, 617–630.
Avoine, G., Bourgeois, A., & Carpent, X. (2015). Analysis of rainbow tables with fingerprints. Information Security and Privacy, 9144, 356–374.
Acknowledgements
This work has been partially supported by the Serbian Ministry of Education and Science (the Projects III 44006 and III 44009).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Tomašević, V., Tomašević, M. Double Time-Memory Trade-Off in OSK RFID Protocol. Wireless Pers Commun 108, 551–568 (2019). https://doi.org/10.1007/s11277-019-06417-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06417-8