RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A lightweight RFID protocol using substring
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Hi-index | 0.00 |
Lightweight authentication protocols are necessary in the RFID system because tags are lack of computational resources and communication ability. Many researchers have proposed some authentication protocols which only use lightweight operations, such as XOR, hash operation and so on. In this paper, we analyze some authentication protocols. Especially, we analyze a forward secure RFID privacy protection scheme proposed by Ohkubo et al and find its weakness. Afterwards, we propose an improved forward secure RFID privacy protection scheme and analyze it. It is low-cost and suitable for inexpensive tags. Moreover, it not only provides one-way authentication and forward security but also resists replay attack.