A Security and Performance Evaluation of Hash-Based RFID Protocols

  • Authors:
  • Tong-Lee Lim;Tieyan Li;Yingjiu Li

  • Affiliations:
  • Institute for Infocomm Research, A*STAR, Singapore;Institute for Infocomm Research, A*STAR, Singapore;School of Information Systems, Singapore Management University,

  • Venue:
  • Information Security and Cryptology
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, forward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.