An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer

被引:6
|
作者
Zhang, Rong [1 ]
Zhu, Liehuang [1 ]
Xu, Chang [1 ]
Yi, Yi [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing Engn Res Ctr Mass Language Informat Proc, Beijing 100081, Peoples R China
关键词
RFID; Batch authentication; Ownership transfer; Security; Privacy;
D O I
10.1109/CIC.2015.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Tag Authentication is an essential issue in RFID system which is wildly applied in many areas. Compared to the per-tag-based authentication, the batch-mode authentication has better performance for complex applications. However, many existing batch authentication protocols suffer from security and privacy threats, low efficiency problem or high communication and computation cost. In order to solve these problems better, we propose a new RFID batch authentication protocol. In this protocol, tags are grouped and each key in one group shares the same group key. The connection between the group key and the tag's own key is fully utilized to construct our batch authentication protocol. Meanwhile, based on the proposed batch authentication protocol, we propose a group tags ownership transfer protocol which also supports the tag authorisation recovery. Compared with previous schemes, our scheme achieves stronger security and higher efficiency. In the side of security and privacy, our scheme meets most requirements, such as tag information privacy, forward/backward security, resistance against reply, tracking, and Dos attacks. Then we carry on the theoretical analysis and implement the simulation experiment. Both of them indicate that the performance of our scheme is much efficient than other authentication schemes. Particularly, the simulation results show that the run time of the whole authentication process in our scheme is decreased 20% at least compared with the other existing schemes.
引用
收藏
页码:168 / 175
页数:8
相关论文
共 50 条
  • [1] Secure Group Ownership Transfer Protocol for Tags in RFID System
    He, Lei
    Gan, Yong
    Yin, Yi-feng
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 21 - 30
  • [2] A Secure and Efficient Authentication Protocol for Passive RFID Tags
    Kolias, Constantinos
    Kolias, Vasilis
    Kambourakis, Georgios
    [J]. 2009 6TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2009), 2009, : 36 - +
  • [3] Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags
    Zuo, Yanjun
    [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 4389 - 4398
  • [4] A Novel Authentication Protocol Enabling RFID Tags Ownership Transfer
    Wang, Hong
    Yang, Xiaolong
    Huang, Qiong
    Long, Keping
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 855 - 860
  • [5] An Efficient and Secure RFID Protocol with Ownership Transfer
    Tsai, Hsin-Ruey
    Horng, Gwoboa
    Chen, Yu-Chi
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 592 - 597
  • [6] A secure rfid authentication and ownership transfer protocol in serverless environment
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    [J]. ICIC Express Letters, 2012, 6 (06): : 1429 - 1433
  • [7] An efficient RFID authentication protocol supporting tag ownership transfer
    Jialiang, He
    Dantong, Ouyang
    Youjun, Xu
    Yu, Shang
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (04) : 244 - 253
  • [8] Secure multiple group ownership transfer protocol for mobile RFID
    Yang, Ming Hour
    [J]. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2012, 11 (04) : 361 - 373
  • [9] A secure privacy and authentication protocol for passive RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2017, 15 (03) : 266 - 277
  • [10] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421