An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens

被引:15
|
作者
Chen, Min [1 ]
Chen, Shigang [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
关键词
D O I
10.1109/ICDCS.2015.94
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio frequency identification (RFID) technologies are widely used in many applications. The widespread use of tags in traditional ways of deployment raises a privacy concern: They make their carriers trackable. This paper studies the problem of anonymous authentication. Due to resource constraints of low-cost tags, we develop a new technique to generate dynamic tokens for anonymous authentication by following an asymmetric design principle that pushes most complexity to more powerful RFID readers. Instead of implementing complicated cryptographic hash functions, our authentication protocol only requires tags to perform several simple hardware-efficient operations such as bitwise XOR, one-bit left circular shift and bit flip. Moreover, our protocol reduces the communication overhead and online computation overhead to O(1) per authentication for both tags and readers, which compares favorably with the prior art.
引用
收藏
页码:756 / 757
页数:2
相关论文
共 50 条
  • [41] An Efficient Ultra lightweight Mutual Authentication Scheme for RFID Systems: Airy Protocol
    Yeh, Kuo-Hui
    Lo, N. W.
    Winata, Enrico
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (06): : 887 - 897
  • [42] AUTHENTICATION AND DYNAMIC KEY MANAGEMENT PROTOCOL BASED ON CERTIFIED TOKENS FOR MANETS
    Ammayappan, Kavitha
    Sastry, V. N.
    Negi, Atul
    2009 GLOBAL MOBILE CONGRESS, 2009, : 28 - +
  • [43] Mutual Authentication Protocol for Networked RFID Systems
    Fernando, Harinda
    Abawajy, Jemal
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 417 - 424
  • [44] Security Enhancement of the Authentication Protocol for RFID Systems
    Lee, Yung-Cheng
    Kuo, Wen-Chung
    Hsieh, Y. -C
    Chen, T-C
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
  • [45] An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems
    Li, Wenmin
    Zhang, Shuo
    Su, Qi
    Wen, Qiaoyan
    Chen, Yang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [46] Privacy and Authentication Protocol for Mobile RFID Systems
    Ben Niu
    Xiaoyan Zhu
    Haotian Chi
    Hui Li
    Wireless Personal Communications, 2014, 77 : 1713 - 1731
  • [47] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [48] Mutual authentication protocol for mobile RFID systems
    Zhou, Jingxian
    Zhou, Yajian
    Xiao, Feng
    Niu, Xinxin
    Journal of Computational Information Systems, 2012, 8 (08): : 3261 - 3268
  • [49] An Authentication Protocol Applied to RFID Security Systems
    Gong, Xiaoqing
    Wang, Yi
    Li, Hui
    He, Jian
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
  • [50] Efficient dynamic k-times anonymous authentication
    Nguyen, Lan
    Progress in Cryptology - VIETCRYPT 2006, 2006, 4341 : 81 - 98