Review of different classes of RFID authentication protocols


Ibrahim A., Dalkılıç G.

WIRELESS NETWORKS, cilt.25, sa.3, ss.961-974, 2019 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Derleme
  • Cilt numarası: 25 Sayı: 3
  • Basım Tarihi: 2019
  • Doi Numarası: 10.1007/s11276-017-1638-3
  • Dergi Adı: WIRELESS NETWORKS
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus
  • Sayfa Sayıları: ss.961-974
  • Anahtar Kelimeler: Authentication protocols, Radio-frequency identification, Radio-frequency identification attacks, Radio-frequency identification authentication protocols, TREE-LSHB PLUS, LOW-COST, STRONG PRIVACY, HB-NUMBER, SECURITY, IDENTIFICATION, CRYPTANALYSIS, SYSTEMS, TAGS, SCHEME
  • Dokuz Eylül Üniversitesi Adresli: Evet

Özet

Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.