Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Improved Lightweight RFID Authentication Protocol

An Improved Lightweight RFID Authentication Protocol
View Sample PDF
Author(s): Xiaowen Zhang (College of Staten Island – CUNY, USA), Zhanyang Zhang (College of Staten Island – CUNY, USA) and Xinzhou Wei (New York City College of Technology – CUNY, USA)
Copyright: 2013
Pages: 9
Source title: Technological Solutions for Modern Logistics and Supply Chain Management
Source Author(s)/Editor(s): ZongWei Luo (The University of Hong Kong, China)
DOI: 10.4018/978-1-4666-2773-4.ch001


View An Improved Lightweight RFID Authentication Protocol on the publisher's website for pricing and purchasing information.


This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability within VB’s original successive session key permutation algorithm. We propose three improvements, namely removing bad shuffles, hopping the runs, and authenticating mutually, to prevent DFJ’s attacks, thereby significantly strengthening the security of the protocol without introducing extra resource cost.

Related Content

Pedro B. Agua, Anacleto Correia, Armindo S. Frias. © 2022. 23 pages.
Kripanshu Vora. © 2022. 27 pages.
Simona Šinko, Bojan Rupnik, Roman Gumzej. © 2022. 16 pages.
Daniel Londono-Bernal, Adil Hammadi, Torsten Reiners. © 2022. 33 pages.
Panagiotis Kotsios, Dimitrios Folinas. © 2022. 15 pages.
Olcay Polat. © 2022. 22 pages.
Saibal Kumar Saha, Sangita Saha, Ajeya Jha. © 2022. 32 pages.
Body Bottom