Abstract

RFID systems usually involve passive tags (with limited computing and storage capacity) to secure data exchange via wireless communication. This paper builds an effective lightweight privacy protection authentication protocol, over the XCro, rotation and XOR functions, to handle the privacy and security problems in RFID systems. We employ both BAN Logic and ProVerif to prove that the new protocol is secure, its writing logic is correct, the query results are true and the protocol is free of all common attacks. We also conduct the OPNET simulation to evaluate the performance of our protocol and the existing lightweight protocol of Fan, in terms of authentication time, throughput, bandwidth consumption rate and queuing delay. The obtained results show that our protocol is more secure and effective—because we can resist all of the mentioned common attacks by a more efficient authentication process which involves less calculations, communications and transmissions.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.