Efficient and Low-Cost RFID Authentication Schemes

Security in passive resource-constrained Radio Frequency IDentification (RFID) tags is of much interest nowadays. Supply-chain, inventory management is the areas where low-cost and secure batch-mode authentication of RFID tags is required. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also necessary to thwart any illegal attempt to read the tags. With an objective to design a tracking, cloning, and replay attack resistant low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based protocol using symmetric keys, named YA-TRAP. However, resistance against timing attack is very important for timestamp-based schemes, and the timestamps should be renewed in regular intervals to keep the tags operative.

Provided by: Hiroshima City University Topic: Mobility Date Added: Sep 2011 Format: PDF

Find By Topic