RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A lightweight RFID protocol using substring
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Hi-index | 0.00 |
Lightweight authentication protocols are necessary in the RFID system because the information security is important and tags lack computational resources, memory, power and communication ability. Many researchers proposed some lightweight authentication protocols which only use lightweight operations, such as hash function, XOR etc. In this paper, we analyze the security of protocols respectively proposed by Li et al and Chien et al. Afterwards, we propose an improved lightweight authentication protocol using substring function and analyze its property. The result indicates that this protocol does not increase the computation amount and can provide mutual authentication, forward secrecy and protect from traceability attack, replay attack and DoS attack.