Academic
Publications
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity

SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,10.1109/TDSC.2007.70226,IEEE Transactio

SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity   (Citations: 47)
BibTex | RIS | RefWorks Download
As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID authentication protocols to resist all possible attacks and threats. However, all of the previous ultralightweight authentication schemes are vulnerable to various attacks. In this paper, we propose a new ultralightweight RFID authentication protocol that provides strong authentication and strong integrity protection of its transmission and of updated data. The protocol requires only simple bit-wise operations on the tag and can resist all the possible attacks. These features make it very attractive to low-cost RFIDs and very low-cost RFIDs.
Journal: IEEE Transactions on Dependable and Secure Computing - TDSC , vol. 4, no. 4, pp. 337-340, 2007
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...Currently, they are not secure enough, and hence researchers have proposed various solutions as introduced by Chien in [1]...
    • ...Recently, Chien [1] proposed a new ultralightweight protocol, called SASI, which provides mutual authentication, tag anonymity, data integrity, and forward security...
    • ...(Note that Rot(x;y) is not clearly dened in [1]...

    Hung-Min Sunet al. On the Security of Chien's Ultralightweight RFID Authentication Protoc...

    • ...Only a small number of the proposed schemes [21 - 24] can conform to GEN-2 RFID specifications...

    Yu-Jung Huanget al. Mutual Authentication Protocol for RFID System

    • ...According to utilized methods, these schemes can be divided into two categories: pseudonym [7, 8] and shared secret update [2, 3, 9-14]...

    Ya-Fen Changet al. A Location-Privacy-Protected RFID Authentication Scheme

    • ...Using the terminology of [6], the full-fledged class refers to protocols requiring support on Tags for conventional cryptographic functions such as symmetric encryption, hashing, or even public key cryptography...
    • ...Our contribution. We focus our attention on a new ultralightweight authentication protocol, recently proposed in [6], to provide strong authentication and strong integrity data protection...
    • ...Let us focus on the protocol proposed by Chien in [6] and on its claimed security properties...
    • ...1. Notice that Chien [6] provided no specification on how to actually compute Rotð� ; �Þ . Hence, in analyzing the protocol, we considered z ¼ y mod 96, since this operation has been used before in the literature with this meaning...
    • ...In the following, we briefly state such properties and, using the wording of [6], we point out the reasons for which such security properties should be guaranteed...
    • ...SASI was explicitly proposed in [6] as an improvement of the UMAP protocols, in order to provide authenticity and integrity and withstand all the possible attacks the UMAP protocols are subject to. The structures of these protocols are pretty much similar (see [29], [27], [28], [6])...
    • ...SASI was explicitly proposed in [6] as an improvement of the UMAP protocols, in order to provide authenticity and integrity and withstand all the possible attacks the UMAP protocols are subject to. The structures of these protocols are pretty much similar (see [29], [27], [28], [6])...

    Paolo D'Arcoet al. On Ultralightweight RFID Authentication Protocols

    • ...Chien [6] divides the high-cost tags into two classes: “full-fledged” and “simple”...
    • ...Many researchers have proposed security mechanisms for lightweight tags [3][5][6][7][8][9]...
    • ...However, most of them have either used expensive hash functions, encryptions (according to the specifications GEN 2 RFID tags cannot support hash or encryption functions [6]) or have some security flaws...
    • ...Karthikeyan and Nesterenko’s [1] matrix based authentication mechanism is one of the very few protocols [6][3][7][10] that also complies with GEN 2 RFID specifications...

    Vinod Ramachandraet al. Lightweight matrix-based authentication protocol for RFID

Sort by: