{"title":"An Efficient and Secure Protocol for Low-cost RFID Systems","authors":"Feng Zhao, Huiyun Li, Fengqi Yu","doi":"10.1109/ICCCS.2009.14","DOIUrl":null,"url":null,"abstract":"Radio frequency identification (RFID) technology is as an automated identification technology and has become pervasive in our lives. However, RFID systems are known vulnerable to counterfeiting and clandestine tracking. The traditional cryptographic operations are too costly to be used for low-cost RFID tag. In this paper, we present an efficient and secure protocol. Our protocol is secure against counterfeiting by means of a shared secret key between each tag and the backend database, and is secure against tracking through changing the tag’s response each time to queries. The protocol can also resist the desynchronization attack. This protocol only demands hardware support of a Pseudo-Random Number Generation (PRNG) and a Cyclic Redundancy Check (CRC) to achieve high security, which makes the protocol easy to implement.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer and Communications Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS.2009.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Radio frequency identification (RFID) technology is as an automated identification technology and has become pervasive in our lives. However, RFID systems are known vulnerable to counterfeiting and clandestine tracking. The traditional cryptographic operations are too costly to be used for low-cost RFID tag. In this paper, we present an efficient and secure protocol. Our protocol is secure against counterfeiting by means of a shared secret key between each tag and the backend database, and is secure against tracking through changing the tag’s response each time to queries. The protocol can also resist the desynchronization attack. This protocol only demands hardware support of a Pseudo-Random Number Generation (PRNG) and a Cyclic Redundancy Check (CRC) to achieve high security, which makes the protocol easy to implement.