Hierarchical ECC-Based RFID Authentication Protocol

被引:0
|
作者
Batina, Lejia [1 ]
Seys, Stefaan [1 ]
Singelee, Dave [1 ]
Verbanwhede, Ingrid [1 ]
机构
[1] KU Leuven ESAT SCD COSIC, B-3001 Louvain, Belgium
来源
RFID SECURITY AND PRIVACY | 2012年 / 7055卷
关键词
RFID; Authentication; ECC; Hierarchical Croups; Privacy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RFID (Radio Frequency identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RPM readers. To tackle this problem, we introduce the concept of RFID groups and propose a hierarchical RFID authentication protocol. By using this protocol, an RFID tag can tune its identification process to the type of reader it is communicating with. Only a subset of readers can learn the identity of a particular tag, while others can only acquire information on the group to which the tag belongs. Our protocol offers impersonation resistance and is narrow-strong privacy-preserving. Furthermore, we extend the concept to multiple level of subgroups, and demonstrate the feasibility of our proposed protocols for RFID tags.
引用
收藏
页码:183 / 201
页数:19
相关论文
共 50 条
  • [1] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    [J]. RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201
  • [2] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    [J]. Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [3] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    [J]. Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [4] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    [J]. ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [5] A Highly Efficient ECC-Based Authentication Protocol for RFID
    Alaoui, Hasnae Lamrani
    El Ghazi, Abdellatif
    Zbakh, Mustapha
    Touhafi, Abdellah
    Braeken, An
    [J]. JOURNAL OF SENSORS, 2021, 2021
  • [6] ECC-based RFID/NFC Mutual Authentication Protocol
    Huo, Weiguang
    Dong, Qingkuan
    Chen, Yuan
    [J]. PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 169 - 177
  • [7] A secure ECC-based RFID mutual authentication protocol for internet of things
    Amjad Ali Alamr
    Firdous Kausar
    Jongsung Kim
    Changho Seo
    [J]. The Journal of Supercomputing, 2018, 74 : 4281 - 4294
  • [8] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294
  • [9] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    [J]. SN Computer Science, 4 (6)
  • [10] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270