Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems

被引:0
|
作者
Lu, Li [1 ]
Han, Jinsong [2 ]
Hu, Lei [3 ]
Ni, Lionel M. [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
10.1155/2012/153912
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking the private information of tags. In previous designs, the RFID tags issue encrypted authentication messages to the RFID reader, and the reader searches the key space to identify the tags. Without key-updating, those schemes are vulnerable to many active attacks, especially the compromising attack. We propose a strong and lightweight RFID private authentication protocol, SPA. By designing a novel key-updating method, we achieve the forward secrecy in SPA with an efficient key search algorithm. We also show that, compared with existing designs, (SPA) is able to effectively defend against both passive and active attacks, including compromising attacks. Through prototype implementation, we demonstrate that SPA is practical and scalable for current RFID infrastructures.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] An autonomous privacy-preserving authentication scheme for intelligent transportation systems
    Sucasas, Victor
    Mantas, Georgios
    Saghezchi, Firooz B.
    Radwan, Ayman
    Rodriguez, Jonathan
    COMPUTERS & SECURITY, 2016, 60 : 193 - 205
  • [32] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [33] Privacy-Preserving Authentication Framework for UAS Traffic Management Systems
    Alsoliman, Anas
    Bin Rabiah, Abdulrahman
    Levorato, Marco
    2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
  • [34] Privacy-preserving authentication using fingerprint
    Feng, Q. (fquan@sina.com), 1600, ICIC International (08):
  • [35] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [36] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [37] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [38] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [39] A privacy-preserving multifactor authentication system
    Acar, Abbas
    Liu, Wenyi
    Beyah, Raheem
    Akkaya, Kemal
    Uluagac, Arif Selcuk
    SECURITY AND PRIVACY, 2019, 2 (05):
  • [40] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    SN Computer Science, 4 (5)