scholarly journals On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems

2018 ◽  
Vol 10 (9) ◽  
pp. 82
Author(s):  
Masoumeh Safkhani ◽  
Nasour Bagheri ◽  
Mahyar Shariat

Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweight RFID Authentication Scheme and show its security weaknesses. More precisely, we show that the ULRAS protocol is vulnerable against de-synchronization attack. The given attack has the success probability of almost ‘1’, with the complexity of only one session of the protocol. In addition, we show that the given attack can be used as a traceability attack against the protocol if the parameters’ lengths are an integer power of 2, e.g., 128. Moreover, we propose a new authentication protocol named UEAP, which stands for an Ultra-lightweight Encryption based Authentication Protocol, and then informally and formally, using Scyther tool, prove that the UEAP protocol is secure against all known active and passive attacks.

Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4752 ◽  
Author(s):  
Khwaja Mansoor ◽  
Anwar Ghani ◽  
Shehzad Chaudhry ◽  
Shahaboddin Shamshirband ◽  
Shahbaz Ghayyur ◽  
...  

Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Zhiyong He

Radio Frequency Identification (RFID) technology has been used in numerous applications, e.g., supply chain management and inventory control. This paper focuses on the practically important problem of the rapid estimation of the number of tags in large-scale RFID systems with multiple readers and multicategory RFID tags. RFID readers are often static and have to be deployed strategically after careful planning to cover the entire monitoring area, but reader-to-reader collision (R2Rc) remains a problem. R2Rc decreases the reliability of the estimation of the tag population size, because it results in the failure of communication between the reader and tags. In this paper, we propose a coloring graph-based estimation scheme (CGE), which is the first estimation framework designed for multireader and multicategory RFID systems to determine the distribution of tags in different categories. CGE allows for the use of any estimation protocol to determine the number of tags, prevents R2Rc, and results in higher time efficiency and less power-consumption than the classic scheduling method DCS.


2015 ◽  
Vol 2 (2) ◽  
pp. 62-77 ◽  
Author(s):  
Mohammadali Forouzandeh ◽  
Nemai Chandra Karmakar

In the past few years Radio Frequency Identification(RFID)has grown to be one of the most popular technologies in the area of identification systems. Following a brief survey of RFID systems, this paper provides a technical review of work undertaken in the field of time-domain chipless RFID tags and sensors. This paper aims not only to address the chipless tags which use Time Domain Reflectometry (TDR) concept for data encoding but also for the use of Ultra-Wideband Impulse-Radar (UWB-IR) as a time-domain measurement technique. The penultimate section intends to focus on time-domain reading setups and finally, a brief comparison between this method and other chipless techniques is provided.


Author(s):  
Gyozo Gódor ◽  
Sándor Imre

Radio frequency identification technology is becoming ubiquitous and, as a side effect, more authentication solutions come to light, which include numerous security issues. The authors’ have previously introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks, which performs exceptionally well in very large systems. In this paper, the authors give a detailed examination of small computational capacity systems from the point of view of security. This paper defines the model of attacker and the well-known attacks that can be achieved in these kinds of environments, as well as an illustration of the proposed protocol’s performance characteristics with measurements carried out in a simulation environment. This paper shows the effects of numerous attacks and the system’s different parameters on the authentication time while examining the performance and security characteristics of two other protocols chosen from the literature to compare the SLAP algorithm and give a proper explanation for the differences between them.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


Author(s):  
Imad Belkacem ◽  
Safia Nait Bahloul ◽  
Oum-El-Kheir Aktouf

Dependability issues become more and more significant in RFID (Radio Frequency Identification) development and especially in critical domains. However, Operations of reading, detection of readers, and measurements of sensors in a RFID system are inevitably subjected to errors. These factors degrade the overall dependability of RFID systems. The authors study the Fault Tolerance in RFID systems as a means to ensure the dependability. The authors propose to perform a statistical analysis on the RFID tags data, using a confidence interval, at the level of the middleware enabling the detection of erroneous readers and sensors.


2017 ◽  
Vol 2017 ◽  
pp. 1-9
Author(s):  
Joshua Bolton ◽  
Erick Jones ◽  
Raghavendra Kumar Punugu ◽  
Ankan Addy ◽  
Samuel Okate

As the price of passive radio frequency identification (RFID) tags continues to decrease, more and more companies are considering item-level tagging. Although the use of RFID is simple, its proper application should be studied to achieve maximum efficiency and utilization in the industry. This paper is intended to demonstrate the test results of various multisurface UHF tags from different manufacturers for their readability under varying conditions such as orientation of tags with respect to reader, distance of tag from the reader, and materials used for embedding tags. These conditions could affect the reliability of RFID systems used for varied applications. In this paper, we implement a Design for Six Sigma Research (DFSS-R) methodology that allows for reliability testing of RFID systems. In this paper, we have showcased our results about the benchmarking of UHF RFID tags and have put forward an important observation about the blind spots observed at different distances and orientations along different surfaces, which is primarily due to the polarity of the antenna chosen.


Author(s):  
Anthony L. Patti ◽  
Anthony Narsing

The Lean Manufacturing principles and methodology seek to eliminate waste from systems.  Many of the lean techniques emphasize simplicity.  For example, 5S (sort, set in order, shine, standardize, and sustain) and visual workplace management strive to organize and maintain the workplace so that it is easy to identify, find, and count items.  Visual signals such as Kanbans are used to time the movement of inventory.  The most basic utility of radio frequency identification (RFID) is to provide timing and location information.  Most RFID systems provide data that indicates when an item has passed by a reader.  As long as it is known where the reader was at the time of the read, location information is also available.  Readers are placed strategically so that after the read, the item’s location is known to be within a defined area.  Additionally, real time locator systems (RTLS’) use an array of readers to triangulate a more precise location for the item.  Implementation of RFID systems is being driven primarily by large retailers and the Department of Defense (DOD).  They are requiring their suppliers to attach RFID tags to the items they supply.  However, it has been noted that suppliers who just “slap and ship” tags will find RFID to be an added expense.  Suppliers who use RFID tags to improve their inventory and production management will find RFID to be an investment with a fairly short payback.  This article will explore the relationship between RFID and Lean Manufacturing.  Are RFID and Lean competitive or compatible?  Does RFID improve Lean systems or do Lean systems improve RFID?


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1951 ◽  
Author(s):  
Jorge Munilla ◽  
Adel Hassan ◽  
Mike Burmester

The term “Internet of Things” was originally coined when radio frequency identification (RFID) technology was being developed to refer to applications where RFID tagged objects and sensors enabled computers to achieve effective situational awareness without human intervention. Currently, this term encompasses a myriad of medium/small devices connected to the Internet. On the other hand, 5G is a key enabling technology that will support next generation wireless communications. Moreover, 5G aims to realize the “Internet of Everything”. Surprisingly, despite the expected relationship between these two technologies, RFID tags have not been properly integrated into 4G and it is not clear if this will change in 5G. RFID is considered as a parallel technology where, at best, it has connection to the core network using back-end servers as gateways between the two technologies. With the aim of overcoming this problem, this paper proposes a 5G compliant RFID protocol that allows RFID tags to act as fully fledged 5G subscribers while taking into account the main characteristics of RFID systems. This proposal leverages the separation between USIM and mobile equipment within the user equipment to implement a 5G compliant protocol where tags accomplish the authentication part, as 5G subscribers, while readers assume the mobile equipment role, carrying out the 5G communication and most of the resource consuming tasks.


Sign in / Sign up

Export Citation Format

Share Document