Handbook of Applied Cryptography
Handbook of Applied Cryptography
Proceedings of the 2007 ACM symposium on Applied computing
Severless Search and Authentication Protocols for RFID
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
A family of dunces: trivial RFID identification and authentication protocols
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
PUF-HB: a tamper-resilient HB based authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Reassignment scheme of an RFID tag’s key for owner transfer
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
ROTIV: RFID ownership transfer with issuer verification
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
PUF-Based RFID authentication protocol against secret key leakage
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |
The promise of RFID technology has been evidently foreseeable due to the low cost and high convenience value of RFID tags. However, the low-cost RFID tags poses new challenges to security and privacy. Some solutions utilize expensive cryptographic primitives such as hash or encryption functions, and some lightweight approaches have been reported to be broken. In this paper, we propose a lightweight solution to Mutual Authentication for RFID systems in which only the authenticated readers and tags can successfully communicate with each other. Then, we adapt our Mutual Authentication scheme to secure the Ownership Transfer of RFID tags. Our mutual authentication and ownership transfer protocols are realized utilizing minimalistic cryptography such as Physically Unclonable Functions (PUF) and Linear Feedback Shift Registers (LFSR). PUFs and LFSRs are very efficient in hardware and particularly suitable for the low-cost RFID tags. Compared to existing solutions built on top of hash functions that require 8000 to 10000 gates, our schemes demand only 784 gates for 64-bit variables and can be easily accommodated by the cheapest RFID tags with only 2000 gates available for security functions.