Title: RFID authentication protocol design methodology

Authors: QingLing Cai; YiJu Zhan; Jian Yang

Addresses: School of Engineering, Sun Yat-sen University, Guangzhou, China ' School of Engineering, Sun Yat-sen University, Guangzhou, China ' Faculty of Automation, Guangdong University of Technology, Guangzhou, China

Abstract: Many RFID authentication protocols have been designed by intuition and experience. Since they lack systematic theory support, these protocols often have a number of vulnerabilities. This paper proposes a series of rules called RFID authentication protocol security enhanced rules (RAPSER), used to provide systematic theory support for RFID authentication protocol design and verification. After a comprehensive and systematic analysis of the essence of RFID security issues and requirements, we propose RAPSER, and then axiomatise its foundation, and formalise its original proposition and negative proposition. By Chien's and Khan's protocol, we demonstrate how RAPSER can be implemented to design and verify RFID authentication protocols. We justified why the popular protocol does not offer sufficient security and privacy protection, and thereafter, proposed a stronger protocol to fix these security holes with RAPSER. The result of this study suggests that RAPSER can be significant for RFID authentication protocol design and verification.

Keywords: radio frequency identification; RFID authentication protocols; RAPSER; authentication protocol design; indistinguishability; privacy protection; RFID security; authentication protocol verification.

DOI: 10.1504/IJES.2015.069985

International Journal of Embedded Systems, 2015 Vol.7 No.2, pp.91 - 103

Received: 28 Jan 2014
Accepted: 03 May 2014

Published online: 22 Jun 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article