DocumentCode
2519455
Title
Enhancements to a Lightweight RFID Authentication Protocol
Author
Zhang, Xiaowen ; Zhang, Zhanyang ; Wei, Xinzhou
Author_Institution
Dept. of Comput. Sci., CUNY, Staten Island, NY, USA
fYear
2009
fDate
21-23 Oct. 2009
Firstpage
454
Lastpage
459
Abstract
This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a set of five lightweight RFID authentication protocols. Defend, Fu, and Juels (DFJ) did cryptanalysis on two of them - XOR and SUBSET. DFJ proposed repeated keys and nibble attacks on the XOR protocol. In this paper, we identify the source of vulnerability within VB´s original successive session key permutation algorithm. We propose three enhancements - removing bad shuffles, hopping the runs, and authenticating mutually - to prevent DFJ´s attacks, thereby significantly strengthening the XOR protocol without introducing extra resource cost.
Keywords
cryptographic protocols; message authentication; radiofrequency identification; telecommunication security; DFJ attack; RFID authentication protocol; XOR protocol; bad shuffle removal; cryptanalysis protocol; nibble attack; session key permutation algorithm; Authentication; Computer science; Computer security; Costs; Cryptographic protocols; Educational institutions; Network servers; Privacy; RFID tags; Radiofrequency identification; RFID; mutual authentication protocol; random permutation;
fLanguage
English
Publisher
ieee
Conference_Titel
e-Business Engineering, 2009. ICEBE '09. IEEE International Conference on
Conference_Location
Macau
Print_ISBN
978-0-7695-3842-6
Type
conf
DOI
10.1109/ICEBE.2009.71
Filename
5342076
Link To Document