A Security and Performance Evaluation of Hash-Based RFID Protocols

被引:0
|
作者
Lim, Tong-Lee [1 ]
Li, Tieyan [1 ]
Li, Yingjiu [2 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
来源
关键词
RFID Security and Privacy; Authentication Protocols; AUTHENTICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, for-ward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.
引用
收藏
页码:406 / +
页数:3
相关论文
共 50 条
  • [31] An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 481 - 488
  • [32] A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm
    Hu, Feng
    Qian, Hongyan
    Liu, Liangjun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [33] Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems
    Sandhya, M.
    Rangaswamy, T. R.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (03) : 1897 - 1906
  • [34] Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems
    M. Sandhya
    T. R. Rangaswamy
    Arabian Journal for Science and Engineering, 2014, 39 : 1897 - 1906
  • [35] A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm
    Hu, Feng
    Qian, Hongyan
    Liu, Liangjun
    Wireless Communications and Mobile Computing, 2021, 2021
  • [36] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [37] InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels
    Dong, Jiaqing
    Wang, Kai
    Lyu, Yongqiang
    Jiao, Libo
    Yin, Hao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 527 - 537
  • [38] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [39] Hash-based signatures for the Internet of Things
    Palmieri, Paolo
    2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
  • [40] Improving Stateless Hash-Based Signatures
    Aumasson, Jean-Philippe
    Endignoux, Guillaume
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 219 - 242