Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems

被引:0
|
作者
Lu, Li [1 ]
Han, Jinsong [2 ]
Hu, Lei [3 ]
Ni, Lionel M. [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[4] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
10.1155/2012/153912
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking the private information of tags. In previous designs, the RFID tags issue encrypted authentication messages to the RFID reader, and the reader searches the key space to identify the tags. Without key-updating, those schemes are vulnerable to many active attacks, especially the compromising attack. We propose a strong and lightweight RFID private authentication protocol, SPA. By designing a novel key-updating method, we achieve the forward secrecy in SPA with an efficient key search algorithm. We also show that, compared with existing designs, (SPA) is able to effectively defend against both passive and active attacks, including compromising attacks. Through prototype implementation, we demonstrate that SPA is practical and scalable for current RFID infrastructures.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Portunes: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging
    Li, Hongyang
    Dan, Gyorgy
    Nahrstedt, Klara
    2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 920 - 925
  • [42] A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols
    Lee, Chih-Yuan
    Wu, Hsin-Lung
    Chang, Jen-Chun
    Smart Innovation, Systems and Technologies, 2013, 21 : 15 - 23
  • [43] A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management
    Lee, Younho
    Park, Yongsu
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2013, 13 (01) : 23 - 26
  • [44] Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns
    Yang, Anjia
    Boshoff, Dutliff
    Hu, Qiao
    Hancke, Gerhard P.
    Luo, Xizhao
    Weng, Jian
    Mayes, Keith
    Markantonakis, Konstantinos
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14): : 11607 - 11620
  • [45] Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs
    Zhou, Yousheng
    Long, Xingwang
    Chen, Lvjun
    Yang, Zheng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (295-301) : 295 - 301
  • [46] Privacy-preserving model for biometric-based authentication and Key Derivation Function
    Italis, Olson
    Pierre, Samuel
    Quintero, Alejandro
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [47] An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities
    Xia, Xueya
    Ji, Sai
    Vijayakumar, Pandi
    Shen, Jian
    Rodrigues, Joel J. P. C.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (06)
  • [48] Fast privacy preserving RFID authentication protocol
    Zhai, Li
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12): : 3215 - 3222
  • [49] Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication
    Ignatenko, Tanya
    Willems, Frans M. J.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) : 5583 - 5594
  • [50] Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems
    Wang, Min
    Wang, Song
    Hu, Jiankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3350 - 3364