DocumentCode :
1909918
Title :
Ultralightweight RFID Reader-Tag Mutual Authentication Revisited
Author :
Yu-Chung Huang ; Jehn-Ruey Jiang
Author_Institution :
Dept. of Comput. Sci. & Inf., Nat. Central Univ., Jhongli, Taiwan
fYear :
2015
fDate :
June 27 2015-July 2 2015
Firstpage :
166
Lastpage :
173
Abstract :
The RFID (Radio Frequency Identification) technology plays an important role of providing mobile services in Internet of Things (IoT) environments. In an RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database and even access IoT-aware services associated with the object. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks. Typical attacks include the man-in-the-middle (MitM), replay, forward secrecy, denial of service (DoS), and impersonation attacks. Due to the extremely small memory and very limited computation power of tags, some RFID reader-tag mutual authentication schemes, like Huang and Jiang´s scheme, Yi et al.´s scheme and Khedr´s scheme, have been proposed to resist these attacks by using on-tag ultra lightweight operations, such as the random number generation (RNG), the pseudo random number generator (PRNG), the cyclic redundancy check (CRC), the exclusive-or (XOR), and lightweight cryptographic hash function (LHash) operations. These schemes still have some flaws, though. This paper proposes an improved mutual authentication scheme using only ultra lightweight operations to resist more attacks and/or achieve lower communication, computation, and tag memory overheads.
Keywords :
Internet of Things; computer network security; cryptography; network servers; radiofrequency identification; DoS attack; Internet of Things environment; IoT environment; MitM attack; backend server database; denial of service attack; forward secrecy attack; impersonation attack; man-in-the-middle attack; on-tag ultralightweight operation; radio frequency identification technology; replay attack; ultralightweight RFID reader-tag mutual authentication scheme; Authentication; Databases; Object recognition; Radiofrequency identification; Resists; Servers; Internet of Things (IoT); Radio Frequency Identification (RFID); hash; mutual authentication; privacy; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Services (MS), 2015 IEEE International Conference on
Conference_Location :
New York, NY
Print_ISBN :
978-1-4673-7283-1
Type :
conf
DOI :
10.1109/MobServ.2015.32
Filename :
7226686
Link To Document :
بازگشت