Abstract
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, forward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Karthikeyan, S., Nesterenko, M.: RFID Security Without Extensive Cryptography. In: 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (2005)
Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing the Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning. In: Symposium on Cryptography and Information Security (2006)
Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computers Standards & Interfaces 29(2), 254–259 (2007)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez Tapiador, J.M., Ribgorda, A.: Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard. In: Workshop on RFID Security (RFIDSec 2007) (2007)
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)
Feldhofer, M.: Comparing the Stream Ciphers Trivium and Grain for their Feasibility on RFID Tags. In: Proceedings of Austrochip 2007 (2007)
Hein, D., Wolkerstorfer, J., Felber, N.: ECC is Ready for RFID - A Proof in Silicon. In: 4th Workshop on RFID Security (RFIDSec) 2008 (2008)
O’Neill, M.: Low-Cost SHA-1 Hash Function Architecture for RFID Tags. In: 4th Workshop on RFID Security (RFIDSec) 2008 (2008)
Rolfes, C., Poschmann, A., Paar, C.: Security for 1000 Gate Equivalents. In: Secure Component and System Identification (SECSI) 2008 (2008)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to ‘Privacy-Friendly’ Tags. In: RFID Privacy Workshop. MIT, Cambridge (2003)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: Proceedings of the Int’l Workshop on Pervasive Computing and Communication Security (PerSec) 2005, pp. 110–114 (2005)
Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. In: Proceedings of the IEEE Int’l Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm) 2005 (2005)
Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications Workshops (PerComW) 2006, pp. 640–643 (2006)
Chatmon, C., van Le, T., Burmester, M.: Secure Anonymous RFID Authentication Protocols. Technical Report TR-060112, Florida State University, Computer Science Dept. (2006)
Dimitriou, T.: A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete. In: Proceedings of the 1st Int’l Conference on Pervasive Computing and Communications (PerCom) 2006, pp. 269–275 (2006)
Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices and Architectures. In: Proceedings of the ACM Conference on Computer and Communication Security (2004)
Lu, L., Han, J.S., Hu, L., Liu, Y.H., Ni, L.M.: Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications (PerCom) 2007 (2007)
Conti, M., Di Pietro, R., Mancini, L.V., Spognardi, A.: RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications Workshops (PerComW) 2007, pp. 229–234 (2007)
Henrici, D., Muller, P.: Providing Security and Privacy in RFID Systems Using Triggered Hash Chains. In: Proceedings of the IEEE Int’l Conference on Pervasive Computing and Communications (PerCom) 2008, pp. 50–59 (2008)
Lim, T.-L., Li, T., Gu, T.: Secure RFID Identification and Authentication with Triggered Hash Chain Variants. In: Proceedings of the 14th Int’l Conference on Parallel and Distributed Systems (ICPADS) 2008 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, TL., Li, T., Li, Y. (2009). A Security and Performance Evaluation of Hash-Based RFID Protocols. In: Yung, M., Liu, P., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2008. Lecture Notes in Computer Science, vol 5487. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01440-6_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-01440-6_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01439-0
Online ISBN: 978-3-642-01440-6
eBook Packages: Computer ScienceComputer Science (R0)