RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Secure authentication scheme for passive C1G2 RFID tags
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Lightweight authentication protocols in the RFID system are necessary because the channel between the tag and reader is not secure and the tag has very limited computation resources, memory and power. Many researchers have proposed some lightweight authentication protocols in order to provide some security properties, such as mutual authentication, untraceability etc. In this paper, we firstly analyze two lightweight authentication protocols, YA-TRAP and a 2-Pass optimistic anonymous RFID authentication protocol, and find their security drawbacks. Afterwards, we propose an enhanced 2- Pass optimistic anonymous RFID authentication protocol with forward security and analyze its property. The result indicates this protocol does not increase the tag's cost and computation amount. Moreover, it can provide mutual authentication, untraceability, forward security and protect from replay attack and desynchronization attack.