Communications of the ACM
Some Modular Adders and Multipliers for Field Programmable Gate Arrays
IPDPS '03 Proceedings of the 17th International Symposium on Parallel and Distributed Processing
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
The Evolution of RFID Security
IEEE Pervasive Computing
Severless Search and Authentication Protocols for RFID
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
An efficient group-based secret sharing scheme
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Hi-index | 0.00 |
With increase in applicability of RFID technology, there is ever growing demand for security. The popularity of RFID applicability lies in its ability for automatic identification and low-cost of RFID tags. Most of the recent security protocols for RFID technology are based on cryptographic hash-based function which currently cannot be implemented on low-cost RFID tags. In this paper, we present a lightweight protocol based on key transportation and authentication using threshold secret sharing scheme which provides strong security on low-cost RFID tags without the need to connect to the backend server. Our solution is based on an asymmetric computation strategy allocating mathematical operations such as modular addition and XOR on passive RFID tags and move the computational complexity to the RFID interrogators. We believe a secure protocol on low-cost RFID tags would make RFID technology ubiquitous.