scholarly journals A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division

2007 ◽  
Vol 14C (5) ◽  
pp. 431-438
Author(s):  
Soo-Young Kang ◽  
Im-Yeong Lee
Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5824
Author(s):  
Souhir Gabsi ◽  
Vincent Beroulle ◽  
Yann Kieffer ◽  
Hiep Manh Dao ◽  
Yassin Kortli ◽  
...  

The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach the required security and confidentiality requirements for data transfer, elliptic curve cryptography (ECC) is a powerful solution, which ensures a tag/reader mutual authentication and guarantees data integrity. In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. We compare the various lightweight ECC primitive implementations designed for RFID applications in terms of occupied area and power consumption. Then, we highlight the security threats that can be encountered considering both network attacks and side-channel attacks and analyze the security effectiveness of RFID authentication protocols against such types of attacks. For this purpose, we classify the different threats that can target an ECC-based RFID system. After that, we present the most promising ECC-based protocols released during 2014–2021 by underlining their advantages and disadvantages. Finally, we perform a comparative study between the different protocols mentioned regarding network and side-channel attacks, as well as their implementation costs to find the optimal one to use in future works.


2013 ◽  
Vol 278-280 ◽  
pp. 1966-1971
Author(s):  
Qing Xuan Jia ◽  
Xin Wang ◽  
Xin Gao ◽  
Pan Pan Gao ◽  
Bing Zhao

Due to the radio transmission nature of RFID, the challenge of security and privacy has seriously hindered the large-scale development of RFID technology. However, low-cost RFID tags have the characteristic of extremely limited resources, traditional security primitives cannot be better applied in RFID system. Hence, Designing an effective ultralightweight security protocol applying to low-cost tag is crucial for the various applications of RFID system. In this paper, we propose an ultralightweight secure protocol with mutual authentication. Without adopting classical cryptographic primitives, the protocol proposed only employs simple bit-wise operations such as xor and module addition. Meanwhile, the protocol can resist various attacks and has features of low computation cost and communication traffic.


Sign in / Sign up

Export Citation Format

Share Document