Improving the Security of a Low-cost Tag Search Protocol

Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among a large number of tags. Numerous works have b...

Full description

Bibliographic Details
Main Authors: S. Saderi Oskuiee, F. Moazami, G. Oudi Ghadim
Format: Article
Language:English
Published: Shahid Rajaee Teacher Training University 2021-01-01
Series:Journal of Electrical and Computer Engineering Innovations
Subjects:
Online Access:https://jecei.sru.ac.ir/article_1481_440c6abd071c26471c8339a18c79931f.pdf
_version_ 1817981298552078336
author S. Saderi Oskuiee
F. Moazami
G. Oudi Ghadim
author_facet S. Saderi Oskuiee
F. Moazami
G. Oudi Ghadim
author_sort S. Saderi Oskuiee
collection DOAJ
description Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among a large number of tags. Numerous works have been done about authentication and ownership protocols, but the number of researches done in the tag searching area is much less. Although security is a paramount factor in search protocols, but these days designers are looking for a secure search protocol that is also low cost. One way to have a low cost search protocol is that to be compatible with EPC C1G2 standard, which is an electronic product code class 1 generation 2 that works in the 860-960 MHz frequency range.Methods: Most recently, Sundaresan et al. have proposed an RFID tag search protocol based on quadratic residues and 128 bit pseudo random number generators and XOR operation that can be easily implemented on passive tags and is compatible with EPC C1G2 standard. We show that this protocol is not immune against tag tracing, and try to improve the protocol in a way that traceability attack will not be applicable and the protocol stays low cost and EPC compatible.Results: Since the problem in Sundaresan et al.'s search protocol is due to the tag not being able to recognize the used queries from the new ones, we improved the protocol using a counter within the queries, so the tag will realize that the query is used or not. Then we analyze the security of the improved protocol and prove its formal and informal security against known attacks.Conclusion: In this paper, we firstly analyze the security of Sundaresan et al.'s search protocol and show that the search protocol is vulnerable to traceability attack with two different scenarios. Then we propose an improved search protocol that is secure against tracing the tags. Following that, we analyze the security of the improved search protocol.
first_indexed 2024-04-13T23:05:08Z
format Article
id doaj.art-5e262e89033b46a3b4ca4da6cd3c79a2
institution Directory Open Access Journal
issn 2322-3952
2345-3044
language English
last_indexed 2024-04-13T23:05:08Z
publishDate 2021-01-01
publisher Shahid Rajaee Teacher Training University
record_format Article
series Journal of Electrical and Computer Engineering Innovations
spelling doaj.art-5e262e89033b46a3b4ca4da6cd3c79a22022-12-22T02:25:43ZengShahid Rajaee Teacher Training UniversityJournal of Electrical and Computer Engineering Innovations2322-39522345-30442021-01-0191253610.22061/jecei.2020.7342.3831481Improving the Security of a Low-cost Tag Search ProtocolS. Saderi Oskuiee0F. Moazami1G. Oudi Ghadim2Department of Content Transfer Technology, Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran.Department of Content Transfer Technology, Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran.Department of Content Transfer Technology, Cyberspace Research Institute, Shahid Beheshti University, Tehran, Iran.Background and Objectives: Radio Frequency Identification (RFID) systems use radio frequency waves to exchange information between a legitimate sender and a receiver. One of the important features of RFID systems is to find and track a specific tag among a large number of tags. Numerous works have been done about authentication and ownership protocols, but the number of researches done in the tag searching area is much less. Although security is a paramount factor in search protocols, but these days designers are looking for a secure search protocol that is also low cost. One way to have a low cost search protocol is that to be compatible with EPC C1G2 standard, which is an electronic product code class 1 generation 2 that works in the 860-960 MHz frequency range.Methods: Most recently, Sundaresan et al. have proposed an RFID tag search protocol based on quadratic residues and 128 bit pseudo random number generators and XOR operation that can be easily implemented on passive tags and is compatible with EPC C1G2 standard. We show that this protocol is not immune against tag tracing, and try to improve the protocol in a way that traceability attack will not be applicable and the protocol stays low cost and EPC compatible.Results: Since the problem in Sundaresan et al.'s search protocol is due to the tag not being able to recognize the used queries from the new ones, we improved the protocol using a counter within the queries, so the tag will realize that the query is used or not. Then we analyze the security of the improved protocol and prove its formal and informal security against known attacks.Conclusion: In this paper, we firstly analyze the security of Sundaresan et al.'s search protocol and show that the search protocol is vulnerable to traceability attack with two different scenarios. Then we propose an improved search protocol that is secure against tracing the tags. Following that, we analyze the security of the improved search protocol.https://jecei.sru.ac.ir/article_1481_440c6abd071c26471c8339a18c79931f.pdfrfid systemssearch protocoleavesdroppingtracing
spellingShingle S. Saderi Oskuiee
F. Moazami
G. Oudi Ghadim
Improving the Security of a Low-cost Tag Search Protocol
Journal of Electrical and Computer Engineering Innovations
rfid systems
search protocol
eavesdropping
tracing
title Improving the Security of a Low-cost Tag Search Protocol
title_full Improving the Security of a Low-cost Tag Search Protocol
title_fullStr Improving the Security of a Low-cost Tag Search Protocol
title_full_unstemmed Improving the Security of a Low-cost Tag Search Protocol
title_short Improving the Security of a Low-cost Tag Search Protocol
title_sort improving the security of a low cost tag search protocol
topic rfid systems
search protocol
eavesdropping
tracing
url https://jecei.sru.ac.ir/article_1481_440c6abd071c26471c8339a18c79931f.pdf
work_keys_str_mv AT ssaderioskuiee improvingthesecurityofalowcosttagsearchprotocol
AT fmoazami improvingthesecurityofalowcosttagsearchprotocol
AT goudighadim improvingthesecurityofalowcosttagsearchprotocol