A Security and Performance Evaluation of Hash-Based Rfid Protocols
Publication Type
Conference Paper
Publication Date
12-2008
Abstract
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of security properties under a multi-level adversarial model. The security properties examined include tag anonymity, tag authenticity, reader authenticity, session unlinkability, forward secrecy, and desynchronization resilience. Furthermore, we also evaluate the performance of the schemes by examining the overhead, namely computational costs, storage memory requirements, and communication costs, incurred under the schemes. Finally, we provide a discussion on the insights gathered from our evaluation.
Keywords
Authentication Protocols, RFID Security and Privacy
Discipline
Computer Sciences
Research Areas
Cybersecurity
Publication
the 4th International Conferences on Information Security and Cryptology (Inscrypt)
First Page
406 - 424
Identifier
10.1007/978-3-642-01440-6_30
Citation
Lim, Tong-Lee; Li, Tieyan; and Li, Yingjiu.
A Security and Performance Evaluation of Hash-Based Rfid Protocols. (2008). the 4th International Conferences on Information Security and Cryptology (Inscrypt). 406 - 424.
Available at: https://ink.library.smu.edu.sg/sis_research/443