Author :
Daou, Hoda ; Kayssi, Ayman ; Chehab, Ali
Abstract :
We implement and test four RFID security protocols: strong private authentication protocol, efficient mutual-authentication protocol, Dimitriou´s lightweight protocol, and advanced semi-randomized access control, by emulating the RFID system. Then, we analyze the results to provide an evaluation of each protocol. RFID tags are very limited in terms of processing power, and cannot perform complex computations. Two types of analysis are thus performed: security and performance. The security analysis examines the following security issues: cloning prevention, man-in-the-middle attack prevention, forward secrecy, tag anonymity, user data confidentiality, replay attack prevention, and compromising resistance. In the performance evaluation, we analyze the following: computation overhead, storage requirements, and communication overhead. As a result, enhancements are added to these protocols to strengthen their security and eliminate their weaknesses.
Keywords :
protocols; radiofrequency identification; telecommunication security; Dimitriou lightweight protocol; RFID security protocols; advanced semi-randomized access control; cloning prevention; communication overhead; computation overhead; efficient mutual-authentication protocol; forward secrecy; man-in-the-middle attack prevention; replay attack prevention; security analysis; storage requirements; strong private authentication protocol; tag anonymity; user data confidentiality; Access control; Access protocols; Authentication; Communication system security; Data security; Performance analysis; Power system security; RFID tags; Radiofrequency identification; System testing;