Lightweight Authentication for RFID Used in VANETs

  • C. Caballero-Gil
  • P. Caballero-Gil
  • A. Peinado-Domínguez
  • J. Molina-Gil
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6928)

Abstract

This work addresses the critical problem of authentication in RFID. It describes a new lightweight scheme for mutual authentication between readers and tags that fulfills the EPCGen2 standard and all practical requirements of low-cost RFID such as resource limitation of tags and minimal interaction between tags and readers. Furthermore, the proposal does not rely on RFID readers as they are portable, and instead of that, it bases its security on trust in the back-end server because all shared secrets are stored only by the tag and the back-end server, with no possible access by the reader at any time.

Keywords

Authentication Protocol Mutual Authentication Stream Cipher Replay Attack Electronic Product Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alien Technology (2004) EPCglobal Class 1 Gen 2: RFID SpecificationGoogle Scholar
  2. 2.
    Avoine, G.: (2010), http://www.avoine.net/rfid/
  3. 3.
    Burmester, M., Van Le, T., de Medeiros, B.: Towards provable security for ubiquitous applications. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 295–312. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Burmester, M., Munilla, J.: A Flyweight RFID Authentication Protocol. In: RFIDSec 2009 The 5th Workshop on RFID Security. Leuven, Belgium (2009)Google Scholar
  5. 5.
    Caballero-Gil, P., Fúster-Sabater, A.: Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol. 3643, pp. 355–364. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Chen, C.L., Deng, Y.Y.: Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection. Engineering Applications of Artificial Intelligence (2009)Google Scholar
  7. 7.
    Chien, H.Y., Chen, C.W.: A lightweight authentication protocol for low-cost RFID. In: Proceedings of the 2nd Workshop on RFID Security (2006)Google Scholar
  8. 8.
    Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. In: Computer Standards and Interfaces, vol. 29. Elsevier, Amsterdam (2007)Google Scholar
  9. 9.
    Choi, E.Y., Lee, D.H., Lim, J.I.: Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID system. Computer Standards & Interfaces 31(6) (2009)Google Scholar
  10. 10.
    Cole, P.H., Ranasinghe, D.C.: Networked RFID System and Lightweight Cryptography. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  11. 11.
    EPCglobal. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860-960 MHz. Tech. report (2007), http://www.epcglobalinc.org/standards/
  12. 12.
    EPCglobal Architecture Framework EPCglobal Final Version 1.3, (1673) (2009), http://www.epcglobalinc.org
  13. 13.
    Eun Young Choi, D.H.L., Lim, J.I.: Anti-cloning protocol suitable to epcglobal class-1 generation-2 rfid systems. Computer Standards & Interfaces 31(6), 1124–1130 (2009)CrossRefGoogle Scholar
  14. 14.
    Fúster-Sabater, A., Caballero-Gil, P.: Linear solutions for cryptographic nonlinear sequence generators. Physics Letters A 369(5-6), 432–437 (2007)CrossRefMATHGoogle Scholar
  15. 15.
    Jin, B., Zhao, X., Long, Z., Qi, F., Yu, S.: Effective and Efficient Event Dissemination for RFID Applications. The Computer Journal 52(8) (2009)Google Scholar
  16. 16.
    Juels, A.: Strengthening EPC tags against cloning. In: ACM-Workshop on Wireless Security, WiSE (2005)Google Scholar
  17. 17.
    Juels, A.: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Koscher, K., Juels, A., Kohno, T., Brajkovic, V.: EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond (2008)Google Scholar
  19. 19.
    Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F.: Securing RFID systems by detecting tag cloning. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 291–308. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  20. 20.
    Li, Y.Z., Cho, Y.B., Um, N.K., Lee, S.H.: Security and privacy on authentication protocol for low-cost RFID. In: IEEE International Conference on Computational Intelligence and Security (2006)Google Scholar
  21. 21.
    Song, B., Mitchell, C.J.: RFID Authentication Protocol for Low-cost Tags. In: WiSec 2008, Alexandria, Virginia, USA (2008)Google Scholar
  22. 22.
    Tsudik, G.: The Grid: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Pervasive Computing and Communications Workshops (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • C. Caballero-Gil
    • 1
  • P. Caballero-Gil
    • 1
  • A. Peinado-Domínguez
    • 2
  • J. Molina-Gil
    • 1
  1. 1.Department of Statistics, Operations Research and ComputingUniversity of La LagunaLa LagunaSpain
  2. 2.E.T.S.I. TelecomunicaciónUniversity of MálagaMálagaSpain

Personalised recommendations