使用双旋转排列的RFID安全超轻量级MAC协议

R. G. Krishna, Greeshma Sarath
{"title":"使用双旋转排列的RFID安全超轻量级MAC协议","authors":"R. G. Krishna, Greeshma Sarath","doi":"10.1109/TAPENERGY.2017.8397286","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identication (RFID) systems automatically identify RFID enabled objects. In RFID enabled objects, an electronic chip called RFID tag is attached. These tags are used by the owners to authenticate authorised users when they enter in the proximity of an RFID reader. RFID tag emits its EPC (Electronic Product Code) in plaintext form. So it is vulnerable. RFID tags are low cost devices with very less memory and processing capability. So it is not possible to secure RFID system using basic cryptographic algorithms. From 2006 onwards lots of UMAPs are proposed. Each protocol have its own pros and cons. It is imperative to design an UMAP which deals with low-cost devices and efficient in terms of tag constraints. The UMAPs must be resistant to various attacks like replay attack, traceability attack, desyncronisation attack, etc. In this paper, we are comparing the pros and cons of existing UMAPs and based on the study we are proposing a new ultra lightweight RFID protocol using Permutation with Double Rotation, which is based on the use of a new bit-wise permutation operation. Along with this new operation, a temporary file is used t o prevent t he traceability attack. Security analysis of the proposed protocol shows that it achieves the capabilities and requirements of the authentication protocol and is resistant to the attacks. Performance evaluation shows that the proposed protocol uses limited resources on tags in terms of storage, computation capability and number of messages used.","PeriodicalId":237016,"journal":{"name":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"UltraLightweight MAC protocol for RFID security using Permutation with double rotation\",\"authors\":\"R. G. Krishna, Greeshma Sarath\",\"doi\":\"10.1109/TAPENERGY.2017.8397286\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio Frequency Identication (RFID) systems automatically identify RFID enabled objects. In RFID enabled objects, an electronic chip called RFID tag is attached. These tags are used by the owners to authenticate authorised users when they enter in the proximity of an RFID reader. RFID tag emits its EPC (Electronic Product Code) in plaintext form. So it is vulnerable. RFID tags are low cost devices with very less memory and processing capability. So it is not possible to secure RFID system using basic cryptographic algorithms. From 2006 onwards lots of UMAPs are proposed. Each protocol have its own pros and cons. It is imperative to design an UMAP which deals with low-cost devices and efficient in terms of tag constraints. The UMAPs must be resistant to various attacks like replay attack, traceability attack, desyncronisation attack, etc. In this paper, we are comparing the pros and cons of existing UMAPs and based on the study we are proposing a new ultra lightweight RFID protocol using Permutation with Double Rotation, which is based on the use of a new bit-wise permutation operation. Along with this new operation, a temporary file is used t o prevent t he traceability attack. Security analysis of the proposed protocol shows that it achieves the capabilities and requirements of the authentication protocol and is resistant to the attacks. Performance evaluation shows that the proposed protocol uses limited resources on tags in terms of storage, computation capability and number of messages used.\",\"PeriodicalId\":237016,\"journal\":{\"name\":\"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TAPENERGY.2017.8397286\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TAPENERGY.2017.8397286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

射频识别(RFID)系统自动识别启用RFID的对象。在启用RFID的对象中,附加了一个称为RFID标签的电子芯片。当授权用户进入RFID读取器附近时,所有者使用这些标签对其进行身份验证。RFID标签以明文形式发出其EPC(电子产品代码)。所以它是脆弱的。RFID标签是低成本设备,具有非常少的内存和处理能力。因此,使用基本的加密算法来保护RFID系统是不可能的。从2006年开始,许多umap被提出。每个协议都有自己的优点和缺点。设计一个UMAP是必要的,它可以处理低成本的设备,并在标签约束方面有效。umap必须能够抵抗各种攻击,如重放攻击、可追溯性攻击、去同步攻击等。在本文中,我们比较了现有umap的优点和缺点,并在研究的基础上,我们提出了一种新的超轻型RFID协议,使用双旋转排列,这是基于使用新的按位排列操作。除了这个新操作,还使用了一个临时文件来防止跟踪性攻击。对该协议的安全性分析表明,该协议达到了认证协议的功能和要求,并具有良好的抗攻击能力。性能评估表明,所提出的协议在存储、计算能力和使用的消息数方面对标签使用了有限的资源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
UltraLightweight MAC protocol for RFID security using Permutation with double rotation
Radio Frequency Identication (RFID) systems automatically identify RFID enabled objects. In RFID enabled objects, an electronic chip called RFID tag is attached. These tags are used by the owners to authenticate authorised users when they enter in the proximity of an RFID reader. RFID tag emits its EPC (Electronic Product Code) in plaintext form. So it is vulnerable. RFID tags are low cost devices with very less memory and processing capability. So it is not possible to secure RFID system using basic cryptographic algorithms. From 2006 onwards lots of UMAPs are proposed. Each protocol have its own pros and cons. It is imperative to design an UMAP which deals with low-cost devices and efficient in terms of tag constraints. The UMAPs must be resistant to various attacks like replay attack, traceability attack, desyncronisation attack, etc. In this paper, we are comparing the pros and cons of existing UMAPs and based on the study we are proposing a new ultra lightweight RFID protocol using Permutation with Double Rotation, which is based on the use of a new bit-wise permutation operation. Along with this new operation, a temporary file is used t o prevent t he traceability attack. Security analysis of the proposed protocol shows that it achieves the capabilities and requirements of the authentication protocol and is resistant to the attacks. Performance evaluation shows that the proposed protocol uses limited resources on tags in terms of storage, computation capability and number of messages used.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信