Skip to Main Content
Lightweight authentication protocols are necessary in the RFID system because tags are lack of computational resources and communication ability. Many researchers have proposed some authentication protocols which only use lightweight operations, such as XOR, hash operation and so on. In this paper, we analyze some authentication protocols. Especially, we analyze a forward secure RFID privacy protection scheme proposed by Ohkubo et al and find its weakness. Afterwards, we propose an improved forward secure RFID privacy protection scheme and analyze it. It is low-cost and suitable for inexpensive tags. Moreover, it not only provides one-way authentication and forward security but also resists replay attack.
Informatics in Control, Automation and Robotics (CAR), 2010 2nd International Asia Conference on (Volume:2 )
Date of Conference: 6-7 March 2010