Skip to main content

A Lightweight Code-Based Authentication Protocol for RFID Systems

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 557))

Abstract

RFID is consider to be a common and useful tool in many applications, such as supply chain management, logistics, manufacturing, inventory control and so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysis of the protocol shows that it also satisfies the essential requirements of RFID systems, including tag anonymity, location privacy, forward security, resistance to replay attack and de-synchronization attack, and immunity to tag compromise attack. We also compare our protocol with previous works in terms of security and performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chien, H.Y.: Sasi: a new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337–340 (2007)

    Article  MathSciNet  Google Scholar 

  2. Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues for rfid systems. Comput. Netw. 52(12), 2373–2380 (2008)

    Article  MATH  Google Scholar 

  3. Lee, Y.K. , Batina, L., Verbauwhede, I.: Ec-rac (ecdlp based randomized access control): provably secure rfid authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97–104. IEEE (2008)

    Google Scholar 

  4. Zhang, X., Li, L., Wu, Y., Zhang, Q.: An ecdlp-based randomized key rfid authentication protocol. In: 2011 International Conference on Network Computing and Information Security (NCIS), vol. 2, pp. 146–149. IEEE (2011)

    Google Scholar 

  5. Chien, H.Y.: Combining rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705–2717 (2013)

    Article  MathSciNet  Google Scholar 

  6. Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost rfid. Proc. SCIS 2004, 719–724 (2004)

    Google Scholar 

  7. Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M.: Dynamic key-updating: privacy-preserving authentication for rfid systems. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2007, pp. 13–22. IEEE (2007)

    Google Scholar 

  8. Lu, L., Han, J., Xiao, R., Liu, Y.: Action: breaking the privacy barrier for rfid systems. In: IEEE INFOCOM 2009, pp. 1953–1961. IEEE (2009)

    Google Scholar 

  9. Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable rfid systems: a privacy-preserving protocol with constant-time identification. IEEE Trans. Parallel Distrib. Syst. 23(8), 1536–1550 (2012)

    Article  Google Scholar 

  10. Chien, H.Y., Laih, C.S.: Ecc-based lightweight authentication protocol with untraceability for low-cost rfid. J. Parallel Distrib. Comput. 69(10), 848–853 (2009)

    Article  Google Scholar 

  11. Liu, A.X., Bailey, L.A., Krishnamurthy, A.H.: Rfidguard: a lightweight privacy and authentication protocol for passive rfid tags. Secur. Commun. Netw. 3(5), 384–393 (2010)

    Article  Google Scholar 

  12. Chen, C.M., Chen, S.M., Zheng, X., Chen, P.Y., Sun, H.M.: A secure rfid authentication protocol adopting error correction code. Sci. World J. 2014, 12 (2014)

    Google Scholar 

  13. Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Li, T., Deng, R.H., Wang, G.: The security and improvement of an ultra-lightweight rfid authentication protocol. Secur. Commun. Netw. 1(2), 135–146 (2008)

    Article  Google Scholar 

  15. Sarma, S.E., Weis, S.A., Engels, D.: Radio-frequency-identification security risks and challenges. Cryptobytes 6(1), 2–9 (2003)

    Google Scholar 

  16. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Molnar, D., Wagner, D.: Privacy and security in library rfid: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM (2004)

    Google Scholar 

  18. Dimitriou, T.: A secure and efficient rfid protocol that could make big brother (partially) obsolete. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2006, pp. 269–275. IEEE (2006)

    Google Scholar 

  19. Yao, Q., Qi, Y., Han, J., Zhao, J., Li, X., Liu, Y.: Randomizing rfid private authentication. In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–10. IEEE (2009)

    Google Scholar 

  20. Li, T., Luo, W., Mo, Z., Chen, S.: Privacy-preserving rfid authentication based on cryptographical encoding. In: INFOCOM, 2012 Proceedings IEEE, pp. 2174–2182. IEEE (2012)

    Google Scholar 

  21. Liao, Y.P., Hsiao, C.M.: A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol. Ad Hoc Networks (2013)

    Google Scholar 

  22. Berlekamp, E.R., McEliece, R.J., Henk, C.A., Van, T.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theor. 24(3), 384–386 (1978)

    Article  MATH  Google Scholar 

  23. McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114–116 (1978)

    Google Scholar 

  24. Gaborit, P., Girault, M.: Lightweight code-based identification and signature. In: IEEE International Symposium on Information Theory, ISIT 2007, pp. 191–195. IEEE (2007)

    Google Scholar 

  25. Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.: Mdpc-mceliece: new mceliece variants from moderate density parity-check codes. In: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2069–2073. IEEE (2013)

    Google Scholar 

  26. von Maurich, I., Güneysu, T.: Lightweight code-based cryptography: qc-mdpc mceliece encryption on reconfigurable devices. In: Proceedings of the conference on Design, Automation & Test in Europe, p. 38. European Design and Automation Association (2014)

    Google Scholar 

  27. Sun, H.M., Ting, W.C., Wang, K.H.: On the security of chien’s ultralightweight rfid authentication protocol. IEEE Trans. Dependable Secure Comput. 2, 315–317 (2009)

    Google Scholar 

  28. Phan, R.W.: Cryptanalysis of a new ultralightweight rfid authentication protocolsasi. IEEE Trans. Dependable Secure Comput. 6(4), 316–320 (2009)

    Article  Google Scholar 

  29. Chen, C.M., Chen, S.M., Zheng, X.Y., Yan, L., Wang, H., Sun, H.M.: Pitfalls in an ecc-based lightweight authentication protocol for low-cost rfid. J. Inf. Hiding Multimed. Signal Process. 5(4) (2014)

    Google Scholar 

  30. Gilbert, H., Robshaw, M., Sibert, H.: Active attack against hb+: a provably secure lightweight authentication protocol. Electronic. Lett. 41(21), 1169–1170 (2005)

    Article  Google Scholar 

  31. Erguler, I.: A key recovery attack on error correcting code based a lightweight security protocol

    Google Scholar 

Download references

Acknowledgments

This work was supported by National 863 project (Grant No. 2013AA014002) and Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA06010701).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuankun Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Z., Zhang, W., Wu, C. (2015). A Lightweight Code-Based Authentication Protocol for RFID Systems. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48683-2_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48682-5

  • Online ISBN: 978-3-662-48683-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics