IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Improved Lightweight RFID Authentication Protocol

An Improved Lightweight RFID Authentication Protocol
View Sample PDF
Author(s): Xiaowen Zhang (College of Staten Island – CUNY, USA), Zhanyang Zhang (College of Staten Island – CUNY, USA)and Xinzhou Wei (New York City College of Technology – CUNY, USA)
Copyright: 2013
Pages: 9
Source title: Technological Solutions for Modern Logistics and Supply Chain Management
Source Author(s)/Editor(s): ZongWei Luo (The University of Hong Kong, China)
DOI: 10.4018/978-1-4666-2773-4.ch001

Purchase

View An Improved Lightweight RFID Authentication Protocol on the publisher's website for pricing and purchasing information.

Abstract

This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability within VB’s original successive session key permutation algorithm. We propose three improvements, namely removing bad shuffles, hopping the runs, and authenticating mutually, to prevent DFJ’s attacks, thereby significantly strengthening the security of the protocol without introducing extra resource cost.

Related Content

Hamed Nozari. © 2024. 13 pages.
Maryam Rahmaty. © 2024. 13 pages.
Mahmonir Bayanati. © 2024. 13 pages.
Kamalendu Pal. © 2024. 33 pages.
Kamalendu Pal. © 2024. 35 pages.
Aminmasoud Bakhshi Movahed, Ali Bakhshi Movahed, Hamed Nozari. © 2024. 31 pages.
Esmael Najafi, Iman Atighi. © 2024. 11 pages.
Body Bottom