A Secure RFID Application Revocation Scheme for IoT

被引:1
|
作者
Fan, Kai [1 ]
Du, Zhao [1 ]
Gong, Yuanyuan [1 ]
Wang, Yue [2 ]
Yan, Tongjiang [3 ]
Li, Hui [1 ]
Yang, Yintang [4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[2] Xian Univ, Sch Informat Engn, Xian, Peoples R China
[3] China Univ Petr, Coll Sci, Qingdao, Peoples R China
[4] Xidian Univ, Key Lab, Minist Educ Wide Band Gap Semicon Mat & Devices, Xian, Peoples R China
来源
基金
中国国家自然科学基金; 中国博士后科学基金; 国家高技术研究发展计划(863计划);
关键词
RFID; authentication; revocation; security; IoT; PRIVACY; QOE;
D O I
10.1587/transinf.2015INP0008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. To facilitate users to use the multi-application RFID tag and revoke some applications in the tag securely and efficiently, a secure RFID application revocation scheme is proposed in this paper. In the scheme, each response for the challenge between tag and reader is different, and a group has the feature of many tags. Even if the group index number and corresponding group are revealed, a specific tag does not be precisely found and tracked. Users are anonymous completely. The scheme also allows users to set the validity period for an application or some applications. If the application contains the validity period and expires, the server will remove the validity period and revoke the application automatically in the tag when the RFID tag accesses server again. The proposed scheme cannot only be used in multi-application RFID tag but also be used in one-application RFID tag. Furthermore, compared with other existing schemes, the scheme provides a higher level of security and has an advantage of performance. Our scheme has the ability of mutual authentication and Anti-replay by adding a random number r2, and it is easy to against synchronization attack. Security proof is given in our paper and performance advantage are mainly reflected in the following points such as forward security, synchronization, storage complexity, computational complexity, etc. Finally, the proposed scheme can be used in multi-application RFID tag to promote the development of the IoT.
引用
收藏
页码:2027 / 2035
页数:9
相关论文
共 50 条
  • [1] RFID secure application revocation for IoT in 5G
    Fan, Kai
    Gong, Yuanyuan
    Du, Zhao
    Li, Hui
    Yang, Yintang
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 175 - 181
  • [2] A Secure and Efficient ID-Based Signature Scheme with Revocation for IOT Deployment
    Yang, Xiaodong
    Wang, Jinli
    Ma, Tingchun
    Chen, Chunlin
    Wang, Caifen
    [J]. 2018 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2018, : 202 - 207
  • [3] Secure Access Control Scheme of RFID System Application
    Huang, Yu-Chih
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 525 - 528
  • [4] A Secure Aggregate Authentication Scheme With Efficient Revocation for IoT-Based Primary Healthcare Service
    Pan, Senshan
    Zhang, Yunxiang
    Wang, Saifei
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 6480 - 6491
  • [5] A secure authentication scheme for IoT application in smart home
    Kumar, Pankaj
    Chouhan, Lokesh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 420 - 438
  • [6] A secure authentication scheme for IoT application in smart home
    Pankaj Kumar
    Lokesh Chouhan
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 420 - 438
  • [7] Secure Electronic Cash Scheme with Anonymity Revocation
    Kang, Baoyuan
    Xu, Danhui
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [8] Efficient secure group signature scheme with revocation
    Zhu, Rongbo
    Liu, Xiaozhu
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 787 - +
  • [9] A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT?
    Sarma, Richa
    Barbhuiya, Ferdous Ahmed
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [10] AN EFFICIENT FORWARD SECURE GROUP SIGNATURE SCHEME WITH REVOCATION
    Sun Huihui Chen Shaozhen (Department of Applied Mathematics
    [J]. Journal of Electronics(China), 2008, (06) : 797 - 802