A Lightweight Mutual Authentication Protocol for RFID

In order to protect the tag and its communication, the authentication between the tag and the reader as well as its backend database is necessary. The paper proposed a mutual authentication protocol by introducing pointer and check number pool which make

  • PDF / 1,714,643 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 77 Downloads / 216 Views

DOWNLOAD

REPORT


Abstract In order to protect the tag and its communication, the authentication between the tag and the reader as well as its backend database is necessary. The paper proposed a mutual authentication protocol by introducing pointer and check number pool which make a simple random number to hide the ID information and disturb the static answers in challenge-response of the protocol. The check number pair selected from the pool in each authentication turn is also pointed out by a random number which controls the shifting of the pointer in pool. The analysis shows that the protocol can resist the common attacks in RFID communication with low computation overhead. Keywords IoT

 RFID  Check number pool  Pointer  Security

Introduction The Internet of Things (IoT) is another milestone after the Internet in the development of information technology. It combines the virtual Internet with human and objects in real world to achieve the interrelation of human with human, human with object and objects with objects. The terminal nodes in IoT are extended to a large number of sensors, Radio Frequency Identification (RFID) labels and intelligent equipment besides computers and human. The recipient and analyzer of C. Zhang Science School, Beijing University of Civil Engineering and Architecture, Beijing 100044, China e-mail: [email protected] H. Mu (&) Beijing Key Laboratory of Communication and Information Systems, School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China e-mail: [email protected]

Y.-M. Huang et al. (eds.), Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Lecture Notes in Electrical Engineering 260, DOI: 10.1007/978-94-007-7262-5_106, Ó Springer Science+Business Media Dordrecht 2014

933

934

C. Zhang and H. Mu

the information in the network may be the device itself rather than the thinking man. The device has limited ability to identify the information source and need new authentication protocols the support the secure communication in IoT. RFID is a main kind of IoT terminals and provides non-contact data transmission with a certain distance which makes an attack window for intruder. We must implement mutual authentication between tag and reader before data transmission to protect the communication. Due to the limited resources of the RFID label, an ideal authentication protocol should be secure, efficient and lightweight. The simplest form of authentication protocols in the RFID system works in this way: the reader sends inquiry request information to scan the target label, and label responds ID items to help identify their own identity. Although this form of authentication protocol is simple and fast, it is vulnerable to forgery, eavesdropping, tracking, impersonation and other attacks. An RFID authentication protocol should be of confidentiality and forward security to prevent tracking, forging and cloning with good certifying efficiency.

Related Work In recent years, more and more research focuses on the IoT and the RFID with its