[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1821748.1821786acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Performance analysis of the simple lightweight authentication protocol

Published: 14 December 2009 Publication History

Abstract

Radio frequency identification technology is becoming ubiquitous and as an unfortunate side effect, more and more authentication solutions come to light that have plenty of security issues to deal with.
In our former contribution we introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very large systems. We gave a theoretical analysis of the SLAP protocol in the point of view of security and performance.
In this paper we illustrate the proposed protocol's performance characteristics with measurements carried out in a simulation environment and compare with the theoretical results. We show the effects of numerous attacks and the system's different parameters on the authentication time. Finally, we examine the performance of two other protocols chosen from the literature in order to compare with SLAP algorithm and give proper explanation for the differences between them.

References

[1]
Weis, S. Security and Privacy in Radio-Frequency Identification Devices, Master Thesis, Massachusetts Institute of Technology (MIT), Massachusetts, USA, 2003
[2]
Bakhtiari, S., Safavi-Naini, R. and Pieprzyk, J. Cryptographic Hash Functions: A Survey, Technical Report 95--09, July 1995.
[3]
Sarma, S., Weis, S. and Engels, D. Radio-Frequency Identification: Security Risks and Challenges, Cryptobytes, RSA Laboratories, Vol. 6. Issue 1., pp. 2--9., Spring 2003.
[4]
Weis, S., Sarma, S. Rivest, R. and Engels, D. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, International Conference on Security in Pervasive Computing -- SPC 2003, pp. 454--469, Boppard, Germany, March 2003.
[5]
Ohkubo, M., Suzuki, K. and Kinoshita, S. Cryptographic Approach to "Privacy-Friendly" Tags, RFID Privacy Workshop, MIT, MA, USA, November 2003.
[6]
Molnar, D. and Wagner, D. Privacy and Security in Library RFID: Issues, Practices, and Architectures, Conference on Computer and Communications Security, pp. 210--219, Washington, DC, USA, Oct 2004.
[7]
Nohl, K. and Evans, D. Quantifying Information Leakage in Tree-Based Hash Protocols, Conference on Information and Communications Security -- ICICS'06, pp. 228--237, Raleigh, North Carolina, USA, Dec 2006.
[8]
Nohara, Y., Inoue, S. Baba, K. and Yasuura, H. Quantitative Evaluation of Unlinkable ID Matching Schemes, Workshop on Privacy in the Electronic Society -- WPES, pp. 55--60, Alexandria, Virginia, USA, Nov 2006.
[9]
Buttyán, L., Holczer, T. and Vajda, I. Optimal Key-Trees for Tree-Based Private Authentication, Workshop on Privacy Enhancing Technologies - PET 2006, Cambridge, United Kingdom, June 2006.
[10]
Luo, Z., Chan, T. and Li, J. S. A Lightweight Mutual Authentication Protocol for RFID Networks, International Conference on e-Business Engineering, pp. 620--625, 2005.
[11]
OMNeT++ Community Site. http://www.omnetpp.org
[12]
Gy. Gódor, M. Antal, Improved Lightweight Mutual Authentication Protocol for RFID Systems, 13th IFIP International Conference on Personal Wireless Communications, Toulouse, France, Sept 30 -- Oct 2, 2008
[13]
Gy. Gódor, M. Antal, S. Imre, Mutual Authentication Protocol for Low Computational Capacity RFID Systems, IEEE Globecom 2008 CCNS, New Orleans, LA, USA, 30 Nov -- 4 Dec, 2008
[14]
Bosselaers, A., Govaerts, R., and Vandewalle, J. Fast Hashing on the Pentium, Lecture Notes in Computer Science, pp. 298--313, 1996
[15]
Dimitriou, T. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks, Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005
[16]
Lim, C. H., and Kwon, T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer, Lecture Notes in Computer Science, 2006
[17]
Sangshin Lee, Tomoyuki Asano and Kwangjo Kim RFID Mutual Authentication Scheme based on Synchronized Secret Information, The 2006 Symposium on Cryptography and Information Security (SCIS), 2006.
[18]
Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador and Arturo Ribagorda, A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags, 2006.
[19]
Stamatiou, P. Privacy Implications of RFID Tags, 2007. Retrieved March 22, 2009, from http://paulstamatiou.com/wp-content/uploads/2007/11/pstam_rfid_paper.pdf
[20]
Thompson, D., Chaudhry, N. and Thompson, W. RFID security threat model, Proceedings Acxiom Laboratory for Applied Research (ALAR) Conf., 2006

Cited By

View all
  • (2014)Security Aspects in Radio Frequency Identification NetworksEncyclopedia of Information Science and Technology, Third Edition10.4018/978-1-4666-5888-2.ch433(4412-4423)Online publication date: 31-Jul-2014
  • (2012)Security Aspects in Radio Frequency Identification SystemsNext Generation Data Communication Technologies10.4018/978-1-61350-477-2.ch009(187-225)Online publication date: 2012
  • (2011)Elliptic curve cryptography based authentication protocol for low-cost RFID tags2011 IEEE International Conference on RFID-Technologies and Applications10.1109/RFID-TA.2011.6068667(386-393)Online publication date: Sep-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
December 2009
663 pages
ISBN:9781605586595
DOI:10.1145/1821748
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Johannes Kepler University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 December 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RFID
  2. authentication
  3. lightweight protocol

Qualifiers

  • Research-article

Conference

MoMM '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Security Aspects in Radio Frequency Identification NetworksEncyclopedia of Information Science and Technology, Third Edition10.4018/978-1-4666-5888-2.ch433(4412-4423)Online publication date: 31-Jul-2014
  • (2012)Security Aspects in Radio Frequency Identification SystemsNext Generation Data Communication Technologies10.4018/978-1-61350-477-2.ch009(187-225)Online publication date: 2012
  • (2011)Elliptic curve cryptography based authentication protocol for low-cost RFID tags2011 IEEE International Conference on RFID-Technologies and Applications10.1109/RFID-TA.2011.6068667(386-393)Online publication date: Sep-2011
  • (2010)Elliptic curve cryptography based mutual authentication protocol for low computational complexity environmentProceedings of the 5th IEEE international conference on Wireless pervasive computing10.5555/1856330.1856388(331-336)Online publication date: 5-May-2010
  • (2010)Simple Lightweight Authentication ProtocolInternational Journal of Business Data Communications and Networking10.4018/jbdcn.20100701046:3(66-94)Online publication date: Jul-2010
  • (2010)Elliptic curve cryptography based authentication protocol for small computational capacity RFID systemsProceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks10.1145/1868630.1868648(98-105)Online publication date: 20-Oct-2010
  • (2010)Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations2010 IEEE International Conference on Wireless Communications, Networking and Information Security10.1109/WCINS.2010.5541860(650-657)Online publication date: Jun-2010
  • (2010)Elliptic curve cryptography based mutual authentication protocol for low computational complexity environmentIEEE 5th International Symposium on Wireless Pervasive Computing 201010.1109/ISWPC.2010.5483740(331-336)Online publication date: May-2010
  • (2010)Security Analysis of the Simple Lightweight Authentication ProtocolProceedings of the 2010 Ninth International Conference on Networks10.1109/ICN.2010.44(231-236)Online publication date: 11-Apr-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media