PAP: A privacy and authentication protocol for passive RFID tags
نویسندگان
چکیده
Passive Radio Frequency Identification (RFID) tags, due to their ability to uniquely identify every individual item and low cost, are well suited for supply chain management and are expected to replace barcodes in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed to be scanned, subjecting them to unauthorized scanning by malicious readers and to various other attacks, including cloning attacks. Therefore, a security protocol for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags. This protocol requires little computation and achieves both privacy and authentication, making it sufficient enough for use in supply chain management; however, this protocol is also suitable for use in other RFID applications as well.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملVulnerability Analysis of PAP for RFID Tags
In this paper, we analyze the security of an RFID authentication protocol proposed by Liu and Bailey [1], called Privacy and Authentication Protocol (PAP), and show its vulnerabilities and faulty assumptions. PAP is a privacy and authentication protocol designed for passive tags. The authors claim that the protocol, being resistant to commonly assumed attacks, requires little computation and pr...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملSecure and Lightweight Authentication Protocol for Mobile RFID Privacy
A mobile RFID system is a radio frequency identification technology that allows users to read the information on its tags. When this free reading function is combined with a mobile RFID system featuring radio frequency identification, it may violate an individuals privacy. This is because others may obtain personal information by reading the tags. In addition, user tracking can be a problem, be...
متن کاملA Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags
In this paper, we propose a lightweight mutual authentication protocol for low-cost Radio Frequency IDentification (RFID) tags. Although RFID systems promise a fruitful future, security and privacy concerns have affected the proliferation of the RFID technology. The proposed protocol aims to protect RFID tags against a wide variety of attacks and especially Denial of Service (DoS) attacks. We f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Communications
دوره 32 شماره
صفحات -
تاریخ انتشار 2009