• DocumentCode
    2519455
  • Title

    Enhancements to a Lightweight RFID Authentication Protocol

  • Author

    Zhang, Xiaowen ; Zhang, Zhanyang ; Wei, Xinzhou

  • Author_Institution
    Dept. of Comput. Sci., CUNY, Staten Island, NY, USA
  • fYear
    2009
  • fDate
    21-23 Oct. 2009
  • Firstpage
    454
  • Lastpage
    459
  • Abstract
    This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a set of five lightweight RFID authentication protocols. Defend, Fu, and Juels (DFJ) did cryptanalysis on two of them - XOR and SUBSET. DFJ proposed repeated keys and nibble attacks on the XOR protocol. In this paper, we identify the source of vulnerability within VB´s original successive session key permutation algorithm. We propose three enhancements - removing bad shuffles, hopping the runs, and authenticating mutually - to prevent DFJ´s attacks, thereby significantly strengthening the XOR protocol without introducing extra resource cost.
  • Keywords
    cryptographic protocols; message authentication; radiofrequency identification; telecommunication security; DFJ attack; RFID authentication protocol; XOR protocol; bad shuffle removal; cryptanalysis protocol; nibble attack; session key permutation algorithm; Authentication; Computer science; Computer security; Costs; Cryptographic protocols; Educational institutions; Network servers; Privacy; RFID tags; Radiofrequency identification; RFID; mutual authentication protocol; random permutation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    e-Business Engineering, 2009. ICEBE '09. IEEE International Conference on
  • Conference_Location
    Macau
  • Print_ISBN
    978-0-7695-3842-6
  • Type

    conf

  • DOI
    10.1109/ICEBE.2009.71
  • Filename
    5342076