Ultralightweight RFID Reader-Tag Mutual Authentication Revisited

Yu-Chung Huang, Jehn-Ruey Jiang
{"title":"Ultralightweight RFID Reader-Tag Mutual Authentication Revisited","authors":"Yu-Chung Huang, Jehn-Ruey Jiang","doi":"10.1109/MobServ.2015.32","DOIUrl":null,"url":null,"abstract":"The RFID (Radio Frequency Identification) technology plays an important role of providing mobile services in Internet of Things (IoT) environments. In an RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database and even access IoT-aware services associated with the object. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks. Typical attacks include the man-in-the-middle (MitM), replay, forward secrecy, denial of service (DoS), and impersonation attacks. Due to the extremely small memory and very limited computation power of tags, some RFID reader-tag mutual authentication schemes, like Huang and Jiang's scheme, Yi et al.'s scheme and Khedr's scheme, have been proposed to resist these attacks by using on-tag ultra lightweight operations, such as the random number generation (RNG), the pseudo random number generator (PRNG), the cyclic redundancy check (CRC), the exclusive-or (XOR), and lightweight cryptographic hash function (LHash) operations. These schemes still have some flaws, though. This paper proposes an improved mutual authentication scheme using only ultra lightweight operations to resist more attacks and/or achieve lower communication, computation, and tag memory overheads.","PeriodicalId":166267,"journal":{"name":"2015 IEEE International Conference on Mobile Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Mobile Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MobServ.2015.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

The RFID (Radio Frequency Identification) technology plays an important role of providing mobile services in Internet of Things (IoT) environments. In an RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database and even access IoT-aware services associated with the object. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks. Typical attacks include the man-in-the-middle (MitM), replay, forward secrecy, denial of service (DoS), and impersonation attacks. Due to the extremely small memory and very limited computation power of tags, some RFID reader-tag mutual authentication schemes, like Huang and Jiang's scheme, Yi et al.'s scheme and Khedr's scheme, have been proposed to resist these attacks by using on-tag ultra lightweight operations, such as the random number generation (RNG), the pseudo random number generator (PRNG), the cyclic redundancy check (CRC), the exclusive-or (XOR), and lightweight cryptographic hash function (LHash) operations. These schemes still have some flaws, though. This paper proposes an improved mutual authentication scheme using only ultra lightweight operations to resist more attacks and/or achieve lower communication, computation, and tag memory overheads.
超轻量RFID阅读器-标签互鉴重见
无线射频识别(RFID)技术在物联网(IoT)环境中提供移动服务发挥着重要作用。在RFID(无线射频识别)系统中,一个具有唯一ID的标签附着在一个对象上,阅读器可以通过识别附着的标签来识别该对象。有了这个标识的标签ID,阅读器就可以从后端服务器数据库中检索对象的相关信息,甚至可以访问与该对象相关的物联网感知服务。由于射频信号的特性,读写器和标签之间的通信很容易受到攻击。典型的攻击包括中间人(MitM)、重放、前向保密、拒绝服务(DoS)和模拟攻击。由于标签的内存非常小,计算能力非常有限,一些RFID读写器-标签相互认证方案,如Huang和Jiang的方案,Yi等人的方案和Khedr的方案,已经被提出通过使用标签上的超轻量级操作,如随机数生成(RNG),伪随机数生成器(PRNG),循环冗余校验(CRC),异或(XOR)和轻量级加密哈希函数(LHash)操作来抵抗这些攻击。不过,这些计划仍有一些缺陷。本文提出了一种改进的互认证方案,仅使用超轻量级操作来抵抗更多攻击和/或实现更低的通信,计算和标记内存开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信