A Security and Performance Evaluation of Hash-Based Rfid Protocols
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, forward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.
Authentication Protocols, RFID Security and Privacy
the 4th International Conferences on Information Security and Cryptology (Inscrypt)
406 - 424
Lim, Tong-Lee; Li, Tieyan; and Li, Yingjiu.
A Security and Performance Evaluation of Hash-Based Rfid Protocols. (2008). the 4th International Conferences on Information Security and Cryptology (Inscrypt). 406 - 424. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/443