Communications of the ACM
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Some Modular Adders and Multipliers for Field Programmable Gate Arrays
IPDPS '03 Proceedings of the 17th International Symposium on Parallel and Distributed Processing
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Designing Digital Computer Systems with Verilog
Designing Digital Computer Systems with Verilog
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Severless Search and Authentication Protocols for RFID
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Robust, anonymous RFID authentication with constant key-lookup
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
RFID technology has been applied to many business applications in the past few years. The popularity of RFID technology lies in its ability for automatic identification and low cost. Most existing RFID security protocols utilize cryptography based solutions relying on hash functions and symmetric-key based encryptions, which incur high computational overhead and thus are unsuitable for passive RFID tags. In this paper, we present a lightweight secure reader-tag communication protocol providing secure key lookup, key transportation, reader-tag mutual authentication, and data confidentiality without using traditional cryptography based encryption and hash functions. Our approach is based on light-weight exclusive-or (XOR) one-time pad and modulo addition on passive RFID tags and readers. Our security and performance analysis shows that the proposed solutions are suitable for low-power passive RFID tags.