Security and Performance Analysis for RFID Protocols

Radio Frequency Identification (RFID) is an advanced object identification technology that has already been applied in various industries. However, the insecure nature of the communication channel between readers and tags makes RFID systems vulnerable to various kinds of attacks. In recent years, ma...

Full description

Saved in:
Bibliographic Details
Main Author: LIANG, Bing
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/etd_coll/52
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1050&context=etd_coll
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.etd_coll-1050
record_format dspace
spelling sg-smu-ink.etd_coll-10502018-10-25T09:24:00Z Security and Performance Analysis for RFID Protocols LIANG, Bing Radio Frequency Identification (RFID) is an advanced object identification technology that has already been applied in various industries. However, the insecure nature of the communication channel between readers and tags makes RFID systems vulnerable to various kinds of attacks. In recent years, many new methods have been proposed to improve the security of RFID systems, such as disabling tags, agent management and establishing cryptographic protocols. Among them, we focus on the last approach, which is more economic and convenient in certain cases. The first part of our work is to categorize typical existing RFID protocols according to their security levels. The result is vitally important to RFID system administrators who need to find different protocols to be implemented in their systems. The trade-off to be made in decision is that higher security level typically implies worse performance. We examine the performance in two aspects: the look-up cost in RFID reader’s back-end database and the tag-related cost. The tag-related cost includes the cryptographicoperation cost (cryptographic computation cost along with access operation cost in RFID tag’s chip memory), and the communication cost between reader and tag. We perform traditional database complexity analysis to assess the database look-up cost, and conduct experiments to evaluate both the cryptographic operation cost and and communication cost, so as to have a thorough understanding of the overall time cost of each RFID protocol. This work is important because efficiency is a major concern in the design of RFID protocols, especially when high security level is achieved with complex cryptographic operations being performed on resource-limited RFID tags. An inefficient RFID protocol could be a bottleneck ofthe whole system in real applications. Finally, we benchmark the performance of each RFID protocol, compare performance of protocols in different security levels and investigate the extra cost required to achieve certain security properties. We find a trade-off between look-up cost and tag-related cost. Based on the results of performance benchmarks, we revise some existing protocols and propose several design suggestions for creating new RFID protocols. 2010-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/etd_coll/52 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1050&context=etd_coll http://creativecommons.org/licenses/by-nc-nd/4.0/ Dissertations and Theses Collection (Open Access) eng Institutional Knowledge at Singapore Management University RFID Protocol Security Performance Benchmark Analysis Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic RFID
Protocol
Security
Performance
Benchmark
Analysis
Information Security
spellingShingle RFID
Protocol
Security
Performance
Benchmark
Analysis
Information Security
LIANG, Bing
Security and Performance Analysis for RFID Protocols
description Radio Frequency Identification (RFID) is an advanced object identification technology that has already been applied in various industries. However, the insecure nature of the communication channel between readers and tags makes RFID systems vulnerable to various kinds of attacks. In recent years, many new methods have been proposed to improve the security of RFID systems, such as disabling tags, agent management and establishing cryptographic protocols. Among them, we focus on the last approach, which is more economic and convenient in certain cases. The first part of our work is to categorize typical existing RFID protocols according to their security levels. The result is vitally important to RFID system administrators who need to find different protocols to be implemented in their systems. The trade-off to be made in decision is that higher security level typically implies worse performance. We examine the performance in two aspects: the look-up cost in RFID reader’s back-end database and the tag-related cost. The tag-related cost includes the cryptographicoperation cost (cryptographic computation cost along with access operation cost in RFID tag’s chip memory), and the communication cost between reader and tag. We perform traditional database complexity analysis to assess the database look-up cost, and conduct experiments to evaluate both the cryptographic operation cost and and communication cost, so as to have a thorough understanding of the overall time cost of each RFID protocol. This work is important because efficiency is a major concern in the design of RFID protocols, especially when high security level is achieved with complex cryptographic operations being performed on resource-limited RFID tags. An inefficient RFID protocol could be a bottleneck ofthe whole system in real applications. Finally, we benchmark the performance of each RFID protocol, compare performance of protocols in different security levels and investigate the extra cost required to achieve certain security properties. We find a trade-off between look-up cost and tag-related cost. Based on the results of performance benchmarks, we revise some existing protocols and propose several design suggestions for creating new RFID protocols.
format text
author LIANG, Bing
author_facet LIANG, Bing
author_sort LIANG, Bing
title Security and Performance Analysis for RFID Protocols
title_short Security and Performance Analysis for RFID Protocols
title_full Security and Performance Analysis for RFID Protocols
title_fullStr Security and Performance Analysis for RFID Protocols
title_full_unstemmed Security and Performance Analysis for RFID Protocols
title_sort security and performance analysis for rfid protocols
publisher Institutional Knowledge at Singapore Management University
publishDate 2010
url https://ink.library.smu.edu.sg/etd_coll/52
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1050&context=etd_coll
_version_ 1712300831852724224