ACSP: A novel security protocol against counting attack for UHF RFID systems

被引:16
|
作者
Qian, Zhuzhong [2 ]
Chen, Ce [2 ]
You, Ilsun [1 ]
Lu, Sanglu [2 ]
机构
[1] Korean Bible Univ, Sch Informat Sci, Seoul, South Korea
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China
基金
美国国家科学基金会;
关键词
UHF RFID; System security; Counting attack;
D O I
10.1016/j.camwa.2011.08.030
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Current research on UHF RFID system security mainly focus on protecting communication safety and information privacy between a pair of specific tags and its corresponding interrogation reader. However, instead of stealing detailed private information of tags, adversaries may just want to estimate the cardinality of tags, which is named counting attack. Unfortunately, most existing protocols are vulnerable to counting attack. To defend against this attack, in this paper we propose ACSP, a novel Anti-Counting Security Protocol. ACSP employs session identifier and provides a corresponding authentication metric to verify the commands sent by the reader. To handle counting attack, ACSP periodically updates the session identifier, and securely identifies tags with encryption. We evaluate the performance of ACSP through theoretical analysis and qualitative comparison. Results show that ACSP can efficiently withstand counting attack as well as defending against regular security threats as existing protocols. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:492 / 500
页数:9
相关论文
共 50 条
  • [31] Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
    Sun, Da-Zhi
    Mu, Yi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 254 - 257
  • [32] An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
    Hoda Jannati
    Abolfazl Falahati
    Wireless Personal Communications, 2015, 85 : 711 - 726
  • [33] An Improved HB++ Protocol Against Man-in-middle Attack in RFID System
    He Lei
    Gan Yong
    Li Na-na
    Zhang Tao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2861 - +
  • [34] An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
    Jannati, Hoda
    Falahati, Abolfazl
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 711 - 726
  • [35] Security management against DDOS attack in medical systems architecture
    Bandyopadhyay, Samir Kumar
    International Journal of Multimedia and Ubiquitous Engineering, 2007, 2 (01): : 31 - 46
  • [36] Dual Security Based Protocol Against Gray-Hole Attack in MANET
    Mankotia, Vivek
    Sunkaria, Ramesh Kumar
    Gurung, Shashi
    AD HOC & SENSOR WIRELESS NETWORKS, 2023, 56 (1-2) : 81 - 104
  • [37] Novel Hybrid Physical Layer Security Technique in RFID Systems
    Essam, Gehad
    Shehata, Heba
    Khattab, Tamer
    Abualsaud, Khalid
    Guizani, Mohsen
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1299 - 1304
  • [38] Cryptanalysis and Improvement of a Novel RFID Authentication Protocol for Medical Systems
    Xiao, Feng
    Hu, Xi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2025, 19 (02): : 589 - 611
  • [39] Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems
    Wang, Siye
    Zhu, Shaoyi
    Zhang, Yanfang
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 74 - 77
  • [40] PCPD: A Novel Illustration of Pivotal Parameters of an Attack for Security Systems
    Modaresi, Arash
    Koozehkanani, Ziaddin Daie
    Zolfy, Mina
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 141 - 146