An Efficient RFID Authentication Protocol Providing Strong Privacy and Security

被引:20
|
作者
Shen, Jian [1 ,2 ,3 ,4 ]
Tan, Haowen [1 ,4 ]
Moh, Sangman [5 ]
Chung, Ilyong [5 ]
Wang, Jin [6 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Technol & Engn Ctr Meteorol Sensor Networ, Nanjing, Jiangsu, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[5] Chosun Univ, Dept Comp Engn, Gwangju, South Korea
[6] Yangzhou Univ, Coll Informat Engn, Yangzhou 225009, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2016年 / 17卷 / 03期
基金
美国国家科学基金会;
关键词
RFID authentication; Privacy; Pseudonym; Anonymity; Untraceability; SEARCH; SASI;
D O I
10.6138/JIT.2016.17.3.20141219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the radio frequency identification (RFID) technology continues to evolve and mature, RFID tags can be implemented in a wide range of applications. Due to the shared wireless medium between the RFID reader and the RFID tag, adversaries can launch various attacks on the RFID system. To thwart different types of attacks, we propose an Efficient RFID Authentication Protocol (ERAP), which can accomplish the authentication without disclosing real IDs of the participating tags and provide strong privacy and security protection of the RFID users. ERAP offers the anonymity of tags in addition to tag untraceability. It also provides forward security (forward privacy) which ensures that data transmitted today will still be secure even if secret tag information is revealed by tampering in the future. In this paper, we define a formal security model for authentication and privacy in RFID system. Under this model, we describe protocol that provably achieves the properties of authentication and privacy. In addition, the proposed ERAP requires only little resources to perform the authentication, which satisfies the requirement of highly resource-constrained low-cost RFID tags.
引用
下载
收藏
页码:443 / 455
页数:13
相关论文
共 50 条
  • [1] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Wei Zhang
    Sanya Liu
    Shengming Wang
    Baolin Yi
    Longkai Wu
    Wireless Personal Communications, 2017, 96 : 1215 - 1228
  • [2] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Zhang, Wei
    Liu, Sanya
    Wang, Shengming
    Yi, Baolin
    Wu, Longkai
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1215 - 1228
  • [3] Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security
    Kim, Hun-Wook
    Lim, Shu-Yun
    Lee, Hoon-Jae
    2006 International Conference on Hybrid Information Technology, Vol 2, Proceedings, 2006, : 718 - 723
  • [4] SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    Chien, Hung-Yu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 337 - 340
  • [5] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [6] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [7] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [8] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Wireless Personal Communications, 2013, 69 : 1583 - 1596
  • [9] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1101 - 1104
  • [10] A Gen2-Based RFID Authentication Protocol for Security and Privacy
    Sun, Hung-Min
    Ting, Wei-Chih
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (08) : 1052 - 1062