Rahman 2015
Rahman 2015
Abstract—Radio Frequency Identification (RFID) technology In spite of the current use and encouraging prospects, some
is rapidly making its way to next generation automatic identifica- of the important organizational concerns that need attention
tion systems. Despite encouraging prospects of RFID technology, are security invasion and privacy disclosure. In 2006, Metro
security threats and privacy concerns limit its widespread deploy- AG, a bit supermarket chain in Germany, used RFID tech-
ment. Security in passive RFID tag based systems is a challenge nology to help customers search their target items quickly.
owing to the severe resource restrictions. In this paper, we present
To promote loyalty, they also introduced VIP cards and gave
a lightweight anonymity / mutual authentication protocol that
uses a unique choice of pseudorandom numbers to achieve basic these cards to the top 10% of the customers, based on their
security goals, i.e. confidentiality, integrity and authentication. historical shopping behavior. However, these VIP costumers
We validate our protocol by security analysis. were not aware of the VIP cards having embedded RFID
chips. This was identified when a VIP customer disassembled
Keywords—Anonymity, Mutual Authentication, Security, RFID his card and recognized the embedded RFID chip. Over ten
Security thousands customers’ location privacy data became vulnerable
to disclosure because the VIP card can be easily read by any
I. I NTRODUCTION unauthorized reader [4]. Similarly, the authors in [5] pointed
out that the same benefit, which make the RFID system more
Radio Frequency Identification (RFID) is a wireless radio appealing i.e. convenient non-line-of-sight long range reading,
wave technology where a small electronic chip can be em- can be covertly used to track people as they move through
bedded in any physical object, and can be uniquely identified the world. Security threats and privacy concerns are, thus,
by an RFID reader. In RFID system, the reader broadcasts a the major factors impeding the widespread adoption of RFID
query signal through the forward channel to all passive tags. A systems.
passive RFID tag powers itself from the broadcast query and
responds back with a unique identification (ID) number via the This implies that focus in RFID security should primarily
backscatter channel. The reader then singulates an unique ID be on confidentiality and integrity of communicated mes-
and forwards it to a backend server for further processing of sages, and verification of authenticity of the system entities
the information associated with the tag’s ID [1]. One of the key communicating. Particularly, mutual authentication between
benefits of an RFID system is its non-line-of-sight operation readers-tags, and secure user/location privacy (anonymity and
to automatically identify labeled (or, tagged) objects. untraceability) are the two major concerns of RFID security. A
straightforward solution to accomplish mutual authentication,
RFID technology is not new, it has been around 60 years privacy and data integrity is to adapt existing sophisticated
and was originally developed for distinguishing friendly air- solutions from other wireless networks, such as WiFi or
craft from enemy aircraft during World War II [2]. However, 3G networks. However, severe resource and computational
with improvements in advanced wireless transmission capa- restrictions on low-cost passive RFID tags increases the chal-
bilities and extended data storage space, this technology is lenge associated with this task. This is further complicated
now becoming the next generation identification technology by the fact that passive RFID tags perform one basic task —
in ubiquitous communication environment — replacing the respond to RF queries by any reader [6]. In addition, since
optical bar-code system. RFID systems provide several ben- the communication in RFID is wireless and broadcast, any
efits including contact-less multiple read in one pass, long adversary may capture the communicated messages between
transmission range, and transaction time saving. With these readers and tags using a wireless eavesdropping device and use
benefits, coupled with an unlimited amount of possibilities these captured message to launch many other types of attacks
for connected devices, it is already generating a wealth of such as object tracking, tag compromise and tag impersonation.
valuable data, which can be applied to a variety of systems Therefore, providing security in RFID is challenging and
to enhance our future lives. The simplicity and convenience of requires alternative approaches.
this technology enables it to be a constituent several innovative
applications including, but not limited to — asset management, In the recent past, many researchers have been looking into
tracking, authenticity verification, matching, process control, several innovative solutions for security and privacy in RFID
access control, automated payment and supply chain manage- systems [4], [7]–[10]. Many of these solutions use existing
ment [3]. cryptographic operations such as public key cryptography,
Li et. al. [24] Lo et. al. [4] Chien et. al. [25] Gui et. al. [7] Peris-Lopez et. al. [26] Proposed Protocol
Anonymity & Traceability N Y N Y N Y
Authentication Y Y Y N Y Y
Confidentiality & Integrity N N Y N Y Y
Forward Secrecy Y Y Y Y N Y
Replay-attack N Y Y Y N Y
Man-in-the-Middle N Y Y N N Y
Desynchronization N Y N Y N Y