Security Analysis of the Newest ID-Transfer Scheme for Low-Cost RFID Tags

Author(s):  
YuanYuan YANG ◽  
WenPing MA ◽  
WeiBo LIU ◽  
Qi JIANG
2009 ◽  
Vol 13 (4) ◽  
pp. 274-276 ◽  
Author(s):  
Panagiotis Rizomiliotis ◽  
Evangelos Rekleitis ◽  
Stefanos Gritzalis

2013 ◽  
Vol 9 (1) ◽  
pp. 44 ◽  
Author(s):  
Raghav V. Sampangi ◽  
Srinivas Sampalli

Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.


2019 ◽  
Vol 90 ◽  
pp. 118-128 ◽  
Author(s):  
Y. Liu ◽  
M.F. Ezerman ◽  
H. Wang
Keyword(s):  
Low Cost ◽  

2019 ◽  
Vol 2019 ◽  
pp. 1-25 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Najam-ul-Islam Muhammad

The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the malicious devices from entering the network. This paper presents a brief survey on the authentication protocols along with the prominent cryptanalysis models for the EPC C1G2 RFID systems. A comparative analysis is provided to highlight the common weaknesses of the existing authentication algorithms and to emphasize on the lack of security standardization for the resource constraint IoT network perception layer. This paper is concluded by proposing an ultralightweight protocol that provides Extremely Good Privacy (EGP). The proposed EGP protocol avoids all the pitfalls highlighted by the cryptanalysis of the existing authentication protocols. The incorporation of the novel ultralightweight primitives, Per-XOR (Px) and Inverse Per-XOR (Px-1), makes the protocol messages more robust and irreversible for all types of adversaries. A comprehensive security analysis illustrates that the proposed protocol proves to be highly resistive against all possible attack scenarios and ensures the security optimally.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4740
Author(s):  
Sergio Terranova ◽  
Filippo Costa ◽  
Giuliano Manara ◽  
Simone Genovesi

A new class of Radio Frequency IDentification (RFID) tags, namely the three-dimensional (3D)-printed chipless RFID one, is proposed, and their performance is assessed. These tags can be realized by low-cost materials, inexpensive manufacturing processes and can be mounted on metallic surfaces. The tag consists of a solid dielectric cylinder, which externally appears as homogeneous. However, the information is hidden in the inner structure of the object, where voids are created to encrypt information in the object. The proposed chipless tag represents a promising solution for anti-counterfeiting or security applications, since it avoids an unwanted eavesdropping during the reading process or information retrieval from a visual inspection that may affect other chipless systems. The adopted data-encoding algorithm does not rely on On–Off or amplitude schemes that are commonly adopted in the chipless RFID implementations but it is based on the maximization of available states or the maximization of non-overlapping regions of uncertainty. The performance of such class of chipless RFID tags are finally assessed by measurements on real prototypes.


Sign in / Sign up

Export Citation Format

Share Document