A Security and Performance Evaluation of Hash-Based RFID Protocols

被引:0
|
作者
Lim, Tong-Lee [1 ]
Li, Tieyan [1 ]
Li, Yingjiu [2 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
[2] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
来源
关键词
RFID Security and Privacy; Authentication Protocols; AUTHENTICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, for-ward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.
引用
收藏
页码:406 / +
页数:3
相关论文
共 50 条
  • [41] HASH-BASED ALGORITHMS FOR DISCRETIZED DATA
    Robey, Rachel N.
    Nicholaeff, David
    Robey, Robert W.
    SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2013, 35 (04): : C346 - C368
  • [42] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [43] A Survey of RFID Authentication Protocols Based on Hash-Chain Method
    Syamsuddin, Irfan
    Dillon, Tharam
    Chang, Elizabeth
    Han, Song
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 559 - 564
  • [44] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [45] State Management for Hash-Based Signatures
    McGrew, David
    Kampanakis, Panos
    Fluhrer, Scott
    Gazdag, Stefan-Lukas
    Butin, Denis
    Buchmann, Johannes
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 244 - 260
  • [46] A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation
    Nohara, Yasunobu
    Inoue, Sozo
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 65 - 74
  • [47] Global Optimization for Hash-based Splitting
    Medagliani, Paolo
    Leguay, Jeremie
    Abdullah, Mohammed
    Leconte, Mathieu
    Paris, Stefano
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [48] A Hash-Based Public Key Cryptosystem
    Yin, Qian
    Luo, Gang
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 383 - 392
  • [49] Hash-Based Direct Anonymous Attestation
    Chen, Liqun
    Dong, Changyu
    El Kassem, Nada
    Newton, Christopher J. P.
    Wang, Yalan
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 565 - 600
  • [50] Hash-Based Signatures: State of Play
    Butin, Denis
    IEEE SECURITY & PRIVACY, 2017, 15 (04) : 37 - 43