Title: RFID authentication protocol design methodology
Authors: QingLing Cai; YiJu Zhan; Jian Yang
Addresses: School of Engineering, Sun Yat-sen University, Guangzhou, China ' School of Engineering, Sun Yat-sen University, Guangzhou, China ' Faculty of Automation, Guangdong University of Technology, Guangzhou, China
Abstract: Many RFID authentication protocols have been designed by intuition and experience. Since they lack systematic theory support, these protocols often have a number of vulnerabilities. This paper proposes a series of rules called RFID authentication protocol security enhanced rules (RAPSER), used to provide systematic theory support for RFID authentication protocol design and verification. After a comprehensive and systematic analysis of the essence of RFID security issues and requirements, we propose RAPSER, and then axiomatise its foundation, and formalise its original proposition and negative proposition. By Chien's and Khan's protocol, we demonstrate how RAPSER can be implemented to design and verify RFID authentication protocols. We justified why the popular protocol does not offer sufficient security and privacy protection, and thereafter, proposed a stronger protocol to fix these security holes with RAPSER. The result of this study suggests that RAPSER can be significant for RFID authentication protocol design and verification.
Keywords: radio frequency identification; RFID authentication protocols; RAPSER; authentication protocol design; indistinguishability; privacy protection; RFID security; authentication protocol verification.
International Journal of Embedded Systems, 2015 Vol.7 No.2, pp.91 - 103
Received: 28 Jan 2014
Accepted: 03 May 2014
Published online: 22 Jun 2015 *