Towards lightweight secure communication protocols for passive RFIDs

Dijiang Huang, Harsh Kapoor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

RFID technology has been applied to many business applications in the past few years. The popularity of RFID technology lies in its ability for automatic identification and low cost. Most existing RFID security protocols utilize cryptography based solutions relying on hash functions and symmetric-key based encryptions, which incur high computational overhead and thus are unsuitable for passive RFID tags. In this paper, we present a lightweight secure reader-tag communication protocol providing secure key lookup, key transportation, reader-tag mutual authentication, and data confidentiality without using traditional cryptography based encryption and hash functions. Our approach is based on light-weight exclusive-or (XOR) onetime pad and modulo addition on passive RFID tags and readers. Our security and performance analysis shows that the proposed solutions are suitable for low-power passive RFID tags.

Original languageEnglish (US)
Title of host publication2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009
DOIs
StatePublished - 2009
Event6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009 - Rome, Italy
Duration: Jun 22 2009Jun 26 2009

Publication series

Name2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009

Other

Other6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009
Country/TerritoryItaly
CityRome
Period6/22/096/26/09

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Towards lightweight secure communication protocols for passive RFIDs'. Together they form a unique fingerprint.

Cite this