ACSP: A novel security protocol against counting attack for UHF RFID systems

被引:16
|
作者
Qian, Zhuzhong [2 ]
Chen, Ce [2 ]
You, Ilsun [1 ]
Lu, Sanglu [2 ]
机构
[1] Korean Bible Univ, Sch Informat Sci, Seoul, South Korea
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210008, Peoples R China
基金
美国国家科学基金会;
关键词
UHF RFID; System security; Counting attack;
D O I
10.1016/j.camwa.2011.08.030
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Current research on UHF RFID system security mainly focus on protecting communication safety and information privacy between a pair of specific tags and its corresponding interrogation reader. However, instead of stealing detailed private information of tags, adversaries may just want to estimate the cardinality of tags, which is named counting attack. Unfortunately, most existing protocols are vulnerable to counting attack. To defend against this attack, in this paper we propose ACSP, a novel Anti-Counting Security Protocol. ACSP employs session identifier and provides a corresponding authentication metric to verify the commands sent by the reader. To handle counting attack, ACSP periodically updates the session identifier, and securely identifies tags with encryption. We evaluate the performance of ACSP through theoretical analysis and qualitative comparison. Results show that ACSP can efficiently withstand counting attack as well as defending against regular security threats as existing protocols. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:492 / 500
页数:9
相关论文
共 50 条
  • [41] A Novel Lightweight and Low Power Tag-Reader Mutual Authentication Protocol for Portable RFID based Security Systems
    Vijaykumar, V. R.
    Reghunath, Roshna
    Rajasekar, S.
    Elango, S.
    2016 IEEE INDUSTRIAL ELECTRONICS AND APPLICATIONS CONFERENCE (IEACON), 2016, : 360 - 365
  • [42] A novel Network Partitioning Attack against Routing Protocol in Internet of Things
    Sahay, Rashmi
    Geethakumari, G.
    Mitra, Barsha
    AD HOC NETWORKS, 2021, 121
  • [43] A modified algorithm to improve security and performance of AODV protocol against black hole attack
    Shahabi, Sina
    Ghazvini, Mahdieh
    Bakhtiarian, Mehdi
    WIRELESS NETWORKS, 2016, 22 (05) : 1505 - 1511
  • [44] Modified AODV Routing Protocol to Improve Security and Performance against Black Hole Attack
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [45] Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
    Endo, Kosei
    Kunihiro, Noboru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 153 - 161
  • [46] A modified algorithm to improve security and performance of AODV protocol against black hole attack
    Sina Shahabi
    Mahdieh Ghazvini
    Mehdi Bakhtiarian
    Wireless Networks, 2016, 22 : 1505 - 1511
  • [47] Novel implementation of defence strategy of relay attack based on cloud in RFID systems
    Xu H.
    Shen W.
    Li P.
    Mayes K.
    Wang R.
    Li D.
    Yang S.
    International Journal of Information and Computer Security, 2019, 11 (02) : 120 - 144
  • [48] Development and implementation of novel UHF paper-based RFID designs for anti-counterfeiting and security applications
    Rida, Amin
    Vyas, Rushi
    Wu, Terence
    Li, Ronglin
    Tentzeris, Manos M.
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 52 - +
  • [49] RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data
    Kongze Li
    EURASIP Journal on Information Security, 2024
  • [50] A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol
    Barrero, David F.
    Hernandez-Castro, Julio Cesar
    Peris-Lopez, Pedro
    Camacho, David
    R-Moreno, Maria D.
    EXPERT SYSTEMS, 2014, 31 (01) : 9 - 19