An Efficient RFID Authentication Protocol Providing Strong Privacy and Security

被引:20
|
作者
Shen, Jian [1 ,2 ,3 ,4 ]
Tan, Haowen [1 ,4 ]
Moh, Sangman [5 ]
Chung, Ilyong [5 ]
Wang, Jin [6 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Jiangsu Technol & Engn Ctr Meteorol Sensor Networ, Nanjing, Jiangsu, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[5] Chosun Univ, Dept Comp Engn, Gwangju, South Korea
[6] Yangzhou Univ, Coll Informat Engn, Yangzhou 225009, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2016年 / 17卷 / 03期
基金
美国国家科学基金会;
关键词
RFID authentication; Privacy; Pseudonym; Anonymity; Untraceability; SEARCH; SASI;
D O I
10.6138/JIT.2016.17.3.20141219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the radio frequency identification (RFID) technology continues to evolve and mature, RFID tags can be implemented in a wide range of applications. Due to the shared wireless medium between the RFID reader and the RFID tag, adversaries can launch various attacks on the RFID system. To thwart different types of attacks, we propose an Efficient RFID Authentication Protocol (ERAP), which can accomplish the authentication without disclosing real IDs of the participating tags and provide strong privacy and security protection of the RFID users. ERAP offers the anonymity of tags in addition to tag untraceability. It also provides forward security (forward privacy) which ensures that data transmitted today will still be secure even if secret tag information is revealed by tampering in the future. In this paper, we define a formal security model for authentication and privacy in RFID system. Under this model, we describe protocol that provably achieves the properties of authentication and privacy. In addition, the proposed ERAP requires only little resources to perform the authentication, which satisfies the requirement of highly resource-constrained low-cost RFID tags.
引用
收藏
页码:443 / 455
页数:13
相关论文
共 50 条
  • [31] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [32] Privacy and authentication protocol providing anonymous channels in GSM
    Peinado, A
    COMPUTER COMMUNICATIONS, 2004, 27 (17) : 1709 - 1715
  • [33] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [34] A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    Lim, Jihwan
    Oh, Heekuck
    Kim, Sangjin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 278 - +
  • [35] A More Efficient RFID Authentication Protocol under State-Aware Privacy Model
    Byun, Jin Wook
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 210 - 213
  • [36] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [37] PAP: A privacy and authentication protocol for passive RFID tags
    Liu, Alex X.
    Bailey, LeRoy A.
    COMPUTER COMMUNICATIONS, 2009, 32 (7-10) : 1194 - 1199
  • [38] A secure privacy and authentication protocol for passive RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2017, 15 (03) : 266 - 277
  • [39] Scalable RFID mutual authentication protocol with backward privacy
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (06): : 1276 - 1284
  • [40] An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
    Tan, Haowen
    Choi, Dongmin
    Kim, Pankoo
    Pan, Sungbum
    Chung, Ilyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 481 - 488