A Security and Performance Evaluation of Hash-Based Rfid Protocols

Publication Type

Conference Paper

Publication Date

12-2008

Abstract

In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, forward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.

Keywords

Authentication Protocols, RFID Security and Privacy

Discipline

Computer Sciences

Research Areas

Cybersecurity

Publication

the 4th International Conferences on Information Security and Cryptology (Inscrypt)

First Page

406 - 424

Identifier

10.1007/978-3-642-01440-6_30

Share

COinS