The Vulnerabilities Analysis and Design of the Security Protocol for RFID System

Author(s):  
Hyun-seok Kim ◽  
Jung-hyun Oh ◽  
Jin-young Choi ◽  
Jin-woo Kim
2013 ◽  
Vol 8 (3) ◽  
Author(s):  
Feng Xiao ◽  
Yajian Zhou ◽  
Jingxian Zhou ◽  
Hongliang Zhu ◽  
Xinxin Niu

2013 ◽  
Vol 278-280 ◽  
pp. 1966-1971
Author(s):  
Qing Xuan Jia ◽  
Xin Wang ◽  
Xin Gao ◽  
Pan Pan Gao ◽  
Bing Zhao

Due to the radio transmission nature of RFID, the challenge of security and privacy has seriously hindered the large-scale development of RFID technology. However, low-cost RFID tags have the characteristic of extremely limited resources, traditional security primitives cannot be better applied in RFID system. Hence, Designing an effective ultralightweight security protocol applying to low-cost tag is crucial for the various applications of RFID system. In this paper, we propose an ultralightweight secure protocol with mutual authentication. Without adopting classical cryptographic primitives, the protocol proposed only employs simple bit-wise operations such as xor and module addition. Meanwhile, the protocol can resist various attacks and has features of low computation cost and communication traffic.


2013 ◽  
Vol 303-306 ◽  
pp. 2112-2116 ◽  
Author(s):  
Shu Li ◽  
Xi Yang ◽  
Ping Yuan Liang

This article proposed a new security protocol with satisfying the lightweight requirements of the security of RFID system. Using varying identifiers, the protocol can resist Forward attack, Traffic analysis and Tracking attack, Replay attack. The Back-end Server holds the new identifier and last identifier for every Tag can keep database synchronization. Each Tag store a unique Key that is the secret information which also store in the Back-end Server. Use the Key, the protocol can implement mutual authentication between Back-end Server and Tag. Then the paper compared the proposed protocol with the typical protocols in security, effective and cost. The results demonstrate that the protocol can effectively solve the security problem of RFID systems.


Sign in / Sign up

Export Citation Format

Share Document