­
­
­
­

Inventi Impact - Information Security

Articles

  • Inventi:eis/20235/16
    A SURVEY OF RFID AUTHENTICATION PROTOCOLS
    Mohammed Issam Younis*, Mustafa Hashim Abdulkareem

    Security and privacy are significant issues in radio frequency identification (RFID) systems. There are many RFID authentication protocols have been proposed to address those issues. Some of these protocols employ way hashing function as a mechanism for addressing security and privacy issues of RFID systems, other protocols employ random number generator (RNG) and simple functions like cyclic redundancy code (CRC) functions as a mechanism for solving security and privacy problems and some proposals employ simple bitwise operations (e.g. XOR, AND, OR) for enhancing security and privacy of RFID systems. Although the proposed protocols have the capability to supply particular solution for RFID security and privacy issues, they cannot supply integrated solution. This paper is a survey to closely study those protocols in terms of their focus and limitations. In doing so, the security and privacy requirements are identified. Moreover, based on these requirements; 28 Secure RFID-based systems are discussed and compared in a form of checklist. Finally, this study is recommended to use heavyweighted cryptographic techniques on the back-end side instead of lightweight cryptographic techniques to achieve the missed requirements on the studied authentication protocols.

    How to Cite this Article
    Mohammed Issam Younis, Mustafa Hashim Abdulkareem. A Survey of RFID Authentication Protocols. Inventi Impact: Information Security, 2017(1):1-12, 2017.
    Download Full Text