
In the RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks, leading to privacy and security weakness. Typical attacks include the forged-tag, forged-server, man-in-the-middle (MitM), tracking, replay, forward secrecy and DoS attacks. Due to the extremely small memory and very limited computation power of tags, some security schemes, like Chien and Chen's scheme, Chen and Deng's scheme, have been proposed to resist these attacks by using ultra lightweight operations on tags, such as the random number generation (RNG), the pseudo random number generator (PRNG), the cyclic redundancy check (CRC), and the exclusive-or (XOR) operator. These schemes still have some flaws, though. In this article, we show two mutual authentication schemes using only ultra lightweight operations conforming to the EPC global Class 1 Generation 2 (EPC C1G2) standard to resist aforementioned attacks and reduce the communication and/or computation overheads. We show comparisons of the two schemes and other related ones, and also show some research directions on designing good RFID reader-tag mutual authentication schemes.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 3 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
