A novel secure group RFID authentication protocol

被引:0
|
作者
GUO Cong [1 ]
ZHANG Zi-jian [1 ]
ZHU Lie-huang [1 ]
TAN Yu-an [1 ]
YANG Zhen [1 ]
机构
[1] Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application,School of Computer,Beijing Institute of Technology
基金
中国国家自然科学基金;
关键词
group RFID authentication; compromised attack; elliptic curve; RFID; internet of things(IOT);
D O I
暂无
中图分类号
TP391.45 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
The trend of researching group radio frequency identification devices(RFID) authentication protocol has become increasingly popular in recent years. One of the newest work in this area is from Batina and Lee, they presented a privacy-preserving multi-players grouping-proof protocol based on the elliptic curve cryptography(ECC), and claimed their protocol have the ability to resist five potential attacks, including compromised tag attack, man-in-the-middle attack, colluding tags attack, etc. In this paper, we first take a counterexample to demonstrate their protocol is vulnerable to compromised tag attack. Then we propose a novel secure RFID authentication protocol, and analyze its security by merging formal analysis, provable security, and mathematical inductive method, so as to solve the weakness of Batina and Lee’s work. Furthermore, compared with another two classic protocols(secure ownership transfer protocol(SOTP) and secure multiple group ownership transfer protocol(SMGOTP)), the performance analysis show that our protocol provides not only a lower tags’ communication cost at about 50.0% and 14.3%, but also a lower reader’s computation cost(approximate 14.5% and 55.1% respectively), when transferring a large number of tags.
引用
收藏
页码:94 / 103
页数:10
相关论文
共 50 条
  • [1] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications, 2014, 21 (01) : 94 - 103
  • [2] Lightweight group authentication protocol for secure RFID system
    Kumar, Sanjeev
    Banka, Haider
    Kaushik, Baijnath
    [J]. Multimedia Tools and Applications, 2024, 83 (41) : 89249 - 89277
  • [3] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [4] Secure and Scalable RFID Authentication Protocol
    Fernandez-Mir, Albert
    Castella-Roca, Jordi
    Viejo, Alexandre
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 231 - 243
  • [5] A Secure and Lightweight Authentication Protocol for RFID
    Liu Cheng
    Lin Shenwen
    Li Yingbo
    Li Na
    Wang Xuren
    [J]. PROCEEDINGS OF 2015 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION, 2015, : 317 - 320
  • [6] Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Moessner, Markus B.
    [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [7] An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer
    Zhang, Rong
    Zhu, Liehuang
    Xu, Chang
    Yi, Yi
    [J]. 2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 168 - 175
  • [8] An Authentication Protocol for Secure and Efficient RFID Communication
    Li, Jie
    Wang, Yunfeng
    Jiao, Baoying
    Xu, Yong
    [J]. PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON LOGISTICS SYSTEMS AND INTELLIGENT MANAGEMENT, VOLS 1-3, 2010, : 1648 - +
  • [9] An Efficient and Secure Authentication Protocol for RFID Systems
    Morshed, Md. Monzur
    Atkins, Anthony
    Yu, Hong-Nian
    [J]. INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2012, 9 (03) : 257 - 265
  • [10] A Study on Authentication Protocol for Secure RFID Tag
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-Seog
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692