Abstract

The security, privacy, and operation efficiency of radio frequency identification (RFID) must be fully measured in practical use. A few RFID authentication schemes based on elliptic curve cryptography (ECC) have been proposed, but most of them cannot resist the existing attacks. The scheme presented by Qian et al. could not resist impersonation attack according to our security analysis. Then, we propose a novel lightweight RFID authentication scheme, which is proved that it can resist server spoofing attack, tag masquerade attack, and provide other security properties of a RFID authentication scheme. Comparisons of computation and communication cost demonstrate that the proposed scheme is more suitable for the resource-constrained RFID authentication.

Highlights

  • Radio frequency identification (RFID) is a noncontact automatic identification technology, and the basic principle is to use the transmission characteristics of the RF signal space coupling or reflection to achieve automatic identification of the object

  • An RFID system usually consists of tags, readers, and a backend server [1]

  • The processing capacity, storage space, and energy supply of tag chips are very limited, and many mature security schemes cannot be applied to RFID

Read more

Summary

Introduction

Radio frequency identification (RFID) is a noncontact automatic identification technology, and the basic principle is to use the transmission characteristics of the RF signal space coupling (inductive or electromagnetic coupling) or reflection to achieve automatic identification of the object. The processing capacity, storage space, and energy supply of tag chips are very limited, and many mature security schemes cannot be applied to RFID. Higher security level, lightweight, and efficient RFID authentication scheme has become the new research goal. Several lightweight RFID authentication schemes using cryptography have been successively proposed. These schemes can be roughly divided into the following categories: the schemes using simple bitwise logic operation, the schemes based on hash function, the schemes based on symmetric cryptosystem (AES and others), and the schemes based on public key cryptosystem. Scholars have carried out research on lightweight authentication schemes based on public key cryptography. The security and efficiency comparison results show that the proposed scheme is more secure and has superior computing performance

Related Work
The Improved Scheme
Efficiency and Security Performance Comparisons
Conclusion
Conflicts of Interest
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call