An Efficient RFID Authentication Protocol Providing Strong Privacy and Security

被引:20
|
作者
Shen, Jian [1 ,2 ,3 ,4 ]
Tan, Haowen [1 ,4 ]
Moh, Sangman [5 ]
Chung, Ilyong [5 ]
Wang, Jin [6 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Technol & Engn Ctr Meteorol Sensor Networ, Nanjing, Jiangsu, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[5] Chosun Univ, Dept Comp Engn, Gwangju, South Korea
[6] Yangzhou Univ, Coll Informat Engn, Yangzhou 225009, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2016年 / 17卷 / 03期
基金
美国国家科学基金会;
关键词
RFID authentication; Privacy; Pseudonym; Anonymity; Untraceability; SEARCH; SASI;
D O I
10.6138/JIT.2016.17.3.20141219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the radio frequency identification (RFID) technology continues to evolve and mature, RFID tags can be implemented in a wide range of applications. Due to the shared wireless medium between the RFID reader and the RFID tag, adversaries can launch various attacks on the RFID system. To thwart different types of attacks, we propose an Efficient RFID Authentication Protocol (ERAP), which can accomplish the authentication without disclosing real IDs of the participating tags and provide strong privacy and security protection of the RFID users. ERAP offers the anonymity of tags in addition to tag untraceability. It also provides forward security (forward privacy) which ensures that data transmitted today will still be secure even if secret tag information is revealed by tampering in the future. In this paper, we define a formal security model for authentication and privacy in RFID system. Under this model, we describe protocol that provably achieves the properties of authentication and privacy. In addition, the proposed ERAP requires only little resources to perform the authentication, which satisfies the requirement of highly resource-constrained low-cost RFID tags.
引用
收藏
页码:443 / 455
页数:13
相关论文
共 50 条
  • [21] Privacy and Authentication Protocol for Mobile RFID Systems
    Ben Niu
    Xiaoyan Zhu
    Haotian Chi
    Hui Li
    Wireless Personal Communications, 2014, 77 : 1713 - 1731
  • [22] A Privacy and Authentication Protocol for Mobile RFID System
    Huang, Hui-Feng
    Yu, Po-Kai
    Liu, Kuo-Ching
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INDEPENDENT COMPUTING (ISIC), 2014, : 84 - 89
  • [23] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [24] An Improvement on RFID Authentication Protocol with Privacy Protection
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P-S.
    Chen, T. -C.
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 569 - +
  • [25] A privacy-preserving efficient RFID authentication protocol from SLPN assumption
    Mamun, Mohammad Saiful Islam
    Miyaji, Atsuko
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 10 (03) : 234 - 243
  • [26] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [27] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
  • [28] Self re-encryption protocol providing strong privacy for low cost RFID system
    Park, Jeong Su
    Lee, Su Mi
    Choi, Eun Young
    Lee, Dong Hoon
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 316 - 325
  • [29] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [30] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510