ACSP: A novel security protocol against counting attack for UHF RFID systems

被引:16
|
作者
Qian, Zhuzhong [2 ]
Chen, Ce [2 ]
You, Ilsun [1 ]
Lu, Sanglu [2 ]
机构
[1] Korean Bible Univ, Sch Informat Sci, Seoul, South Korea
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China
基金
美国国家科学基金会;
关键词
UHF RFID; System security; Counting attack;
D O I
10.1016/j.camwa.2011.08.030
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Current research on UHF RFID system security mainly focus on protecting communication safety and information privacy between a pair of specific tags and its corresponding interrogation reader. However, instead of stealing detailed private information of tags, adversaries may just want to estimate the cardinality of tags, which is named counting attack. Unfortunately, most existing protocols are vulnerable to counting attack. To defend against this attack, in this paper we propose ACSP, a novel Anti-Counting Security Protocol. ACSP employs session identifier and provides a corresponding authentication metric to verify the commands sent by the reader. To handle counting attack, ACSP periodically updates the session identifier, and securely identifies tags with encryption. We evaluate the performance of ACSP through theoretical analysis and qualitative comparison. Results show that ACSP can efficiently withstand counting attack as well as defending against regular security threats as existing protocols. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:492 / 500
页数:9
相关论文
共 50 条
  • [21] DDC: A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems
    Kang, Lei
    Wu, Kaishun
    Zhang, Jin
    Tan, Haoyu
    Ni, Lionel M.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (02) : 263 - 270
  • [22] A Novel Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack by ACK
    Lei, Silei
    Zhang, Rui
    Liu, Jun
    Xiao, Junmo
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 612 - 616
  • [23] Security evaluation of the NHB# authentication protocol against a MIM attack
    Tomovic, Sinisa
    Knezevic, Milica
    Mihaljevic, Miodrag J.
    Perovic, Aleksandar
    Ognjanovic, Zoran
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2016, 12 (02):
  • [24] Security Enhancement to a Group Key Transfer Protocol Against Insider Attack
    Huang, Juan
    Li, Yajun
    Liu, Yining
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11): : 4 - 8
  • [25] A Novel Group Ownership Delegate Protocol for RFID Systems
    Cheng-Chi Lee
    Chun-Ta Li
    Chung-Lun Cheng
    Yan-Ming Lai
    Athanasios V. Vasilakos
    Information Systems Frontiers, 2019, 21 : 1153 - 1166
  • [26] A novel anti-collision protocol for RFID systems
    Murano, Tomomitsu
    2007 IEEE Workshop on Automatic Identification Advanced Technologies, Proceedings, 2007, : 118 - 121
  • [27] A novel group ownership transfer protocol for RFID systems
    Lee, Cheng-Chi
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    AD HOC NETWORKS, 2019, 91
  • [28] A Novel Group Ownership Delegate Protocol for RFID Systems
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chung-Lun
    Lai, Yan-Ming
    Vasilakos, Athanasios V.
    INFORMATION SYSTEMS FRONTIERS, 2019, 21 (05) : 1153 - 1166
  • [29] Edwards curves based security authentication protocol for mobile RFID systems
    Yang, Yu-Long
    Peng, Chang-Gen
    Zhou, Zhou
    Zhang, Xiao-Pei
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 132 - 138
  • [30] Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
    Khan, Muhammad Ayaz
    Ullah, Subhan
    Ahmad, Tahir
    Jawad, Khwaja
    Buriro, Attaullah
    SENSORS, 2023, 23 (12)