Mobility Investigate

Efficient and Low-Cost RFID Authentication Schemes

Download now Free registration required

Executive Summary

Security in passive resource-constrained Radio Frequency IDentification (RFID) tags is of much interest nowadays. Supply-chain, inventory management is the areas where low-cost and secure batch-mode authentication of RFID tags is required. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also necessary to thwart any illegal attempt to read the tags. With an objective to design a tracking, cloning, and replay attack resistant low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based protocol using symmetric keys, named YA-TRAP. However, resistance against timing attack is very important for timestamp-based schemes, and the timestamps should be renewed in regular intervals to keep the tags operative.

  • Format: PDF
  • Size: 312.3 KB