An automatic, time-based, secure pairing protocol for passive RFID

  • Authors:
  • George T. Amariucai;Clifford Bergman;Yong Guan

  • Affiliations:
  • Dept. of Electrical and Comp. Engineering, Iowa State University;Dept. of Mathematics, Iowa State University;Dept. of Electrical and Comp. Engineering, Iowa State University

  • Venue:
  • RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper introduces the Adopted-Pet (AP) protocol, an automatic (i.e. requiring no human interaction) secure pairing protocol, adequate for the pairing between a passive RFID tag and a reader. Most pairing protocols rely for their security on a certain advantage that the legitimate devices have over any malicious users. Such advantages include proximity (employing near-field communication) or secret keys that are either produced with the assistance of, or verified by, the legitimate user. The advantage exploited by our novel AP protocol is the amount of uninterrupted time spent by the two devices in the proximity (although not requiring near-field communication) of each-other. We discuss several implementation configurations, all based on pseudo-random bit generators, employing short-length LFSRs, and requiring no more than 2000 transistors. This makes the protocol ideally suited for low-cost passive RFID tags. For each configuration we show that the AP protocol is highly secure against occasional malicious entities.