{"title":"使用双旋转排列的RFID安全超轻量级MAC协议","authors":"R. G. Krishna, Greeshma Sarath","doi":"10.1109/TAPENERGY.2017.8397286","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identication (RFID) systems automatically identify RFID enabled objects. In RFID enabled objects, an electronic chip called RFID tag is attached. These tags are used by the owners to authenticate authorised users when they enter in the proximity of an RFID reader. RFID tag emits its EPC (Electronic Product Code) in plaintext form. So it is vulnerable. RFID tags are low cost devices with very less memory and processing capability. So it is not possible to secure RFID system using basic cryptographic algorithms. From 2006 onwards lots of UMAPs are proposed. Each protocol have its own pros and cons. It is imperative to design an UMAP which deals with low-cost devices and efficient in terms of tag constraints. The UMAPs must be resistant to various attacks like replay attack, traceability attack, desyncronisation attack, etc. In this paper, we are comparing the pros and cons of existing UMAPs and based on the study we are proposing a new ultra lightweight RFID protocol using Permutation with Double Rotation, which is based on the use of a new bit-wise permutation operation. Along with this new operation, a temporary file is used t o prevent t he traceability attack. Security analysis of the proposed protocol shows that it achieves the capabilities and requirements of the authentication protocol and is resistant to the attacks. Performance evaluation shows that the proposed protocol uses limited resources on tags in terms of storage, computation capability and number of messages used.","PeriodicalId":237016,"journal":{"name":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"UltraLightweight MAC protocol for RFID security using Permutation with double rotation\",\"authors\":\"R. G. Krishna, Greeshma Sarath\",\"doi\":\"10.1109/TAPENERGY.2017.8397286\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio Frequency Identication (RFID) systems automatically identify RFID enabled objects. In RFID enabled objects, an electronic chip called RFID tag is attached. These tags are used by the owners to authenticate authorised users when they enter in the proximity of an RFID reader. RFID tag emits its EPC (Electronic Product Code) in plaintext form. So it is vulnerable. RFID tags are low cost devices with very less memory and processing capability. So it is not possible to secure RFID system using basic cryptographic algorithms. From 2006 onwards lots of UMAPs are proposed. Each protocol have its own pros and cons. It is imperative to design an UMAP which deals with low-cost devices and efficient in terms of tag constraints. The UMAPs must be resistant to various attacks like replay attack, traceability attack, desyncronisation attack, etc. In this paper, we are comparing the pros and cons of existing UMAPs and based on the study we are proposing a new ultra lightweight RFID protocol using Permutation with Double Rotation, which is based on the use of a new bit-wise permutation operation. Along with this new operation, a temporary file is used t o prevent t he traceability attack. Security analysis of the proposed protocol shows that it achieves the capabilities and requirements of the authentication protocol and is resistant to the attacks. Performance evaluation shows that the proposed protocol uses limited resources on tags in terms of storage, computation capability and number of messages used.\",\"PeriodicalId\":237016,\"journal\":{\"name\":\"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TAPENERGY.2017.8397286\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TAPENERGY.2017.8397286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
UltraLightweight MAC protocol for RFID security using Permutation with double rotation
Radio Frequency Identication (RFID) systems automatically identify RFID enabled objects. In RFID enabled objects, an electronic chip called RFID tag is attached. These tags are used by the owners to authenticate authorised users when they enter in the proximity of an RFID reader. RFID tag emits its EPC (Electronic Product Code) in plaintext form. So it is vulnerable. RFID tags are low cost devices with very less memory and processing capability. So it is not possible to secure RFID system using basic cryptographic algorithms. From 2006 onwards lots of UMAPs are proposed. Each protocol have its own pros and cons. It is imperative to design an UMAP which deals with low-cost devices and efficient in terms of tag constraints. The UMAPs must be resistant to various attacks like replay attack, traceability attack, desyncronisation attack, etc. In this paper, we are comparing the pros and cons of existing UMAPs and based on the study we are proposing a new ultra lightweight RFID protocol using Permutation with Double Rotation, which is based on the use of a new bit-wise permutation operation. Along with this new operation, a temporary file is used t o prevent t he traceability attack. Security analysis of the proposed protocol shows that it achieves the capabilities and requirements of the authentication protocol and is resistant to the attacks. Performance evaluation shows that the proposed protocol uses limited resources on tags in terms of storage, computation capability and number of messages used.