[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1936254.1936277acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

Performance comparison of the authentication protocols in RFID system

Published: 26 October 2010 Publication History

Abstract

Radio frequency identification (RFID) is a technology for automated identification, which consists of a reading device, a server and RFID tags. We are interested in authentication protocols where two tags are simultaneously scanned by an RFID reader. Although there are several authentication protocols proposed in literature, some of them are insecure. This paper analyses the security of the authentication protocols based on two possible attacks: the brute-force attack against the proof and the forgery attack by using an authorised reader interacting with RFID tags. We also evaluate these protocols in terms of computation costs, communication costs and the resources used by adversary to run the attack (e.g., the size of memories and the number of queries). The results from our analysis indicate that our proposed protocol is more secure than the others and provides a countermeasure against forgery attack.

References

[1]
T. Nuamcherm, P. Kovintavewat, U. Ketprom, C. Tantibundhit and C. Mitrpant, "An Improved Proof for RFID Tags," in Proc. of ECTI-CON 2008, Krabi, Thailand, vol. II, pp. 737--740, May 14--16, 2008.
[2]
K. Finkenzeller, RFID Handbook, 2nd ed., Wiley & Sons, 2002.
[3]
A. Juels. "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 381--394, 2006.
[4]
A. Juels. "Yoking Proofs" for RFID Tags," in Proc. of the First International Workshop on Pervasive Computing and Communication Security. IEEE Press. 2004.
[5]
J. Saito and K. Sakurai, "Grouping Proof for RFID Tags," in Proc. of the 19th International Conference on Advanced Information Networking and Applications (AINA'05), pp. 621--624, 2005.
[6]
S. Piramuthu, "On Existence Proofs for Multiple RFID Tags," IEEE International Conference on Pervasive Services (ICPS'06), pp. 26--29, June 2006, Lyon, France.
[7]
T. Dimitriou. "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks," in Proc. of the IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks -- SECURECOMM, 2005.
[8]
A. Lenstra and E. Verheul. "Selecting Cryptographic Key Sizes," Journal of Cryptography, vol. 14, no. 4, pp. 255--293, 2001.

Cited By

View all
  • (2022)Dispute Resistance Multilayered RFID Partial Ownership Transfer With BlockchainIEEE Access10.1109/ACCESS.2022.322423010(123634-123650)Online publication date: 2022
  • (2020)A Group-based End-to-end Identity Authentication Method for Massive Power Wireless Private Network2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)10.1109/ICEIEC49280.2020.9152318(14-17)Online publication date: Jul-2020
  • (2015)A Novel Multilayered RFID Tagged Cargo Integrity Assurance SchemeSensors10.3390/s15102708715:10(27087-27115)Online publication date: 23-Oct-2015

Index Terms

  1. Performance comparison of the authentication protocols in RFID system

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MEDES '10: Proceedings of the International Conference on Management of Emergent Digital EcoSystems
    October 2010
    302 pages
    ISBN:9781450300476
    DOI:10.1145/1936254
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • NECTEC: National Electronics and Computer Technology Center
    • KU: Kasetsart University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RFID tags
    2. authentication protocol
    3. proof

    Qualifiers

    • Research-article

    Funding Sources

    • RFID Program, National Electronics and Computer Technology Center (NECTEC), Thailand

    Conference

    MEDES '10
    Sponsor:
    • NECTEC
    • KU

    Acceptance Rates

    MEDES '10 Paper Acceptance Rate 26 of 93 submissions, 28%;
    Overall Acceptance Rate 267 of 682 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Dispute Resistance Multilayered RFID Partial Ownership Transfer With BlockchainIEEE Access10.1109/ACCESS.2022.322423010(123634-123650)Online publication date: 2022
    • (2020)A Group-based End-to-end Identity Authentication Method for Massive Power Wireless Private Network2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)10.1109/ICEIEC49280.2020.9152318(14-17)Online publication date: Jul-2020
    • (2015)A Novel Multilayered RFID Tagged Cargo Integrity Assurance SchemeSensors10.3390/s15102708715:10(27087-27115)Online publication date: 23-Oct-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media