Rfid Authentication Protocol Design Methodology

INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS(2015)

Cited 1|Views20
No score
Abstract
Many RFID authentication protocols have been designed by intuition and experience. Since they lack systematic theory support, these protocols often have a number of vulnerabilities. This paper proposes a series of rules called RFID authentication protocol security enhanced rules (RAPSER), used to provide systematic theory support for RFID authentication protocol design and verification. After a comprehensive and systematic analysis of the essence of RFID security issues and requirements, we propose RAPSER, and then axiomatise its foundation, and formalise its original proposition and negative proposition. By Chien's and Khan's protocol, we demonstrate how RAPSER can be implemented to design and verify RFID authentication protocols. We justified why the popular protocol does not offer sufficient security and privacy protection, and thereafter, proposed a stronger protocol to fix these security holes with RAPSER. The result of this study suggests that RAPSER can be significant for RFID authentication protocol design and verification.
More
Translated text
Key words
radio frequency identification, RFID, RAPSER, authentication, indistinguishability, privacy
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined