LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System

  • JeaCheol Ha
  • JungHoon Ha
  • SangJae Moon
  • Colin Boyd
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4412)


Despite various solutions to the security problems in an RFID system, most are unable to fully support all the security requirements. Plus, when designing a viable RFID system, account should also be taken of the computational load on the back-end database and restricted capacity of a tag. Accordingly, an efficient RFID protocol is proposed to reduce the computational load on both the back-end database and the tags, while also guaranteeing most security requirements for RFID wireless communication, including untraceability, authentication, and robustness against replay and spoofing attacks. Plus, in the case of desynchronization resulting from communication failure or malicious attack, the proposed scheme can recover synchronization between the database and the tag.


RFID system Mutual authentication Privacy Traceability Desynchronization attack 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Auto-ID Center. Draft Protocol Specification for a Class 0 Radio Frequency Identification Tag (February 2003)Google Scholar
  2. 2.
    Dimitriou, T.: lightweight RFID protocol to protect against traceability and cloning attacks. Security and Privacy for Emerging Areas in Communications Networks-2005. In: SecureComm 2005, Sept. 2005, pp. 59–66 (2005)Google Scholar
  3. 3.
    Henrici, D., Müller, P.: Hash-based Enhancement of Loaction Privacy for Radio Frequency Identification Devices using Varing Identifiers. In: Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communiations Workshops, pp. 149–162. IEEE Computer Society Press, Los Alamitos (2004)CrossRefGoogle Scholar
  4. 4.
    Juels, A.: RFID Security and Privacy: A Research Survey. RSA Laboratories (2005)Google Scholar
  5. 5.
    Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: Proceeding of 10th ACM Conference on Computer and Communications Security’03, pp. 103–111. ACM Press, New York (2003)CrossRefGoogle Scholar
  6. 6.
    Lee, S., Asano, T., Kim, K.: RFID Mutual Authentication Scheme based on Synchronized Secret Information. In: Proceedings of the SCIS’06 (2006)Google Scholar
  7. 7.
    Lee, S., et al.: Efficient Authentication for Low-cost RFID Systems. In: Gervasi, O., et al. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: Proceedings of the SCIS’04, pp. 719–724 (2004)Google Scholar
  9. 9.
    Rhee, K., et al.: Challenge-Response Based on RFID Authentication Protocol for Distributed Database Envirionment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, Springer, Heidelberg (2005)Google Scholar
  10. 10.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-Frequency Identification: Security Risks and Challenges. RSA Laboratories, vol. 6, no. 1 (2003)Google Scholar
  11. 11.
    Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. MS Thesis, MIT (2003)Google Scholar
  12. 12.
    Weis, S.A., et al.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., et al. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • JeaCheol Ha
    • 1
  • JungHoon Ha
    • 2
  • SangJae Moon
    • 2
  • Colin Boyd
    • 3
  1. 1.Dept. of Information Security, Hoseo Univ., 336-795Korea
  2. 2.School of Electrical Eng. and Computer Science, Kyungpook National Univ., 702-701Korea
  3. 3.Information Security Institute, Queensland Univ. of Technology, GPO Box 2434, Brisbane, QLD, 4001Australia

Personalised recommendations