A novel secure group RFID authentication protocol

被引:0
|
作者
GUO Cong
ZHANG Zi-jian
ZHU Lie-huang
TAN Yu-an
YANG Zhen
机构
[1] BeijingEngineeringResearchCenterofMassiveLanguageInformationProcessingandCloudComputingApplication,SchoolofComputer,BeijingInstituteofTechnology
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they presented a privacy-preserving multi-players grouping-proof protocol based on the elliptic curve cryptography(ECC), and claimed their protocol have the ability to resist five potential attacks, including compromised tag attack, man-in-the-middle attack, colluding tags attack, etc. In this paper, we first take a counterexample to demonstrate their protocol is vulnerable to compromised tag attack. Then we propose a novel secure RFID authentication protocol, and analyze its security by merging formal analysis, provable security, and mathematical inductive method, so as to solve the weakness of Batina and Lee's work. Furthermore, compared with another two classic protocols(secure ownership transfer protocol(SOTP) and secure multiple group ownership transfer protocol(SMGOTP)), the performance analysis show that our protocol provides not only a lower tags' communication cost at about 50.0% and 14.3%, but also a lower reader's computation cost(approximate 14.5% and 55.1% respectively), when transferring a large number of tags.
引用
收藏
页码:94 / 103
页数:10
相关论文
共 50 条
  • [21] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [22] A Secure RFID Authentication Protocol with Low Communication Cost
    Rahman, Mohammad Shahriar
    Soshi, Masakazu
    Miyaji, Atsuko
    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 559 - +
  • [23] Cryptanalysis and improvement of a group RFID authentication protocol
    Nasrollah Pakniat
    Ziba Eslami
    Wireless Networks, 2020, 26 : 3363 - 3372
  • [24] Cryptanalysis and improvement of a group RFID authentication protocol
    Pakniat, Nasrollah
    Eslami, Ziba
    WIRELESS NETWORKS, 2020, 26 (05) : 3363 - 3372
  • [25] Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
    Abyaneh, Mohammad Reza Sohizadeh
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 92 - 103
  • [26] AnonPri: A secure anonymous private authentication protocol for RFID systems
    Rahman, Farzana
    Hoque, Md Endadul
    Ahamed, Sheikh Iqbal
    INFORMATION SCIENCES, 2017, 379 : 195 - 210
  • [27] A Secure RFID Authentication Protocol Adopting Error Correction Code
    Chen, Chien-Ming
    Chen, Shuai-Min
    Zheng, Xinying
    Chen, Pei-Yu
    Sun, Hung-Min
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [28] A secure rfid authentication and ownership transfer protocol in serverless environment
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    ICIC Express Letters, 2012, 6 (06): : 1429 - 1433
  • [29] Secure Improved Cloud-Based RFID Authentication Protocol
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 147 - 164
  • [30] Provable secure mutual authentication protocol for RFID in the standard model
    Xiao, Feng
    Zhou, Ya-Jian
    Zhou, Jing-Xian
    Niu, Xin-Xin
    Tongxin Xuebao/Journal on Communications, 2013, 34 (04): : 82 - 87