RFID authentication protocol design methodology Online publication date: Mon, 22-Jun-2015
by QingLing Cai; YiJu Zhan; Jian Yang
International Journal of Embedded Systems (IJES), Vol. 7, No. 2, 2015
Abstract: Many RFID authentication protocols have been designed by intuition and experience. Since they lack systematic theory support, these protocols often have a number of vulnerabilities. This paper proposes a series of rules called RFID authentication protocol security enhanced rules (RAPSER), used to provide systematic theory support for RFID authentication protocol design and verification. After a comprehensive and systematic analysis of the essence of RFID security issues and requirements, we propose RAPSER, and then axiomatise its foundation, and formalise its original proposition and negative proposition. By Chien's and Khan's protocol, we demonstrate how RAPSER can be implemented to design and verify RFID authentication protocols. We justified why the popular protocol does not offer sufficient security and privacy protection, and thereafter, proposed a stronger protocol to fix these security holes with RAPSER. The result of this study suggests that RAPSER can be significant for RFID authentication protocol design and verification.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Embedded Systems (IJES):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com