A Security and Performance Evaluation of Hash-Based RFID Protocols

被引:0
|
作者
Lim, Tong-Lee [1 ]
Li, Tieyan [1 ]
Li, Yingjiu [2 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
来源
关键词
RFID Security and Privacy; Authentication Protocols; AUTHENTICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, for-ward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.
引用
收藏
页码:406 / +
页数:3
相关论文
共 50 条
  • [1] Secure Hash-based Search Protocols for RFID Systems
    He Jialiang
    Xu Zhiqiang
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
  • [2] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [3] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [4] A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols
    Lee, Chih-Yuan
    Wu, Hsin-Lung
    Chang, Jen-Chun
    Smart Innovation, Systems and Technologies, 2013, 21 : 15 - 23
  • [5] SRFID: A hash-based security scheme for low cost RFID systems
    Khedr, Walid I.
    EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) : 89 - 98
  • [6] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [7] A hash-based pseudonymization infrastructure for RFID systems
    Henrici, Dirk
    Goetze, Joachim
    Mueller, Paul
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
  • [8] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [9] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [10] Enhanced Hash-Based RFID Mutual Authentication Protocol
    Kim, Hyunsung
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 70 - 77