An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection

2017 ◽  
Vol 96 (1) ◽  
pp. 1215-1228 ◽  
Author(s):  
Wei Zhang ◽  
Sanya Liu ◽  
Shengming Wang ◽  
Baolin Yi ◽  
Longkai Wu
2021 ◽  
Vol 2026 (1) ◽  
pp. 012004
Author(s):  
Duo Zhang ◽  
Shangping Wang ◽  
Qian Zhang ◽  
Yinjuan Deng ◽  
Jifang Wang

2010 ◽  
Vol 29-32 ◽  
pp. 2267-2272
Author(s):  
Lei He ◽  
Yong Gan ◽  
Na Na Li ◽  
Tao Zhang

Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide security protection in the RFID system. In the paper, we mainly research lightweight authentication protocols in RFID system. Firstly, we analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide forward security. Thirdly, we propose a revised serverless authentication protocol with forward security. It provides two-way authentication and privacy protection, resists tracking and cloning attack as well as the original protocol. Moreover, it provides forward security protection and resists desynchronization attack. For the efficiency, its computational complexity is at the same level with the protocol proposed by Tan et al.


Author(s):  
Sejin Oh ◽  
Changhee Lee ◽  
Taejin Yun ◽  
Kyungho Chung ◽  
Kwangseon Ahn

2016 ◽  
Vol E99.D (8) ◽  
pp. 2019-2026 ◽  
Author(s):  
Guangquan XU ◽  
Yuanyuan REN ◽  
Yuanbin HAN ◽  
Xiaohong LI ◽  
Zhiyong FENG

2010 ◽  
Vol 29-32 ◽  
pp. 2709-2713
Author(s):  
Xin Mei Lu ◽  
Lei He

It is necessary for researchers to design lightweight authentication protocols to protect information security between tag and reader in RFID system. It is a great challenge to design an efficient and secure protocol because the tag has limited computation resource. In the paper, we firstly analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide two-way authentication. Thirdly, we propose a modified two-way authentication protocol without server for RFID. The result indicates it provides privacy protection, resists tracking, and resists cloning attack. Moreover, it provides two-way authentication. For the efficiency, we think the computational complexity of our protocol is at the same level with the original protocol.


Sign in / Sign up

Export Citation Format

Share Document