Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures

被引:0
|
作者
Braun, Michael [1 ]
Meyer, Ulrike [2 ]
Wetzel, Susanne [3 ]
机构
[1] Univ Appl Sci Darmstadt, Darmstadt, Germany
[2] Rhein Westfal TH Aachen, Aachen, Germany
[3] Stevens Inst Technol, Hoboken, NJ USA
关键词
RFID Security; Elliptic Curve Cryptography; Authentication; Data on Tag; Secret Sharing; Distributed Signatures; Key Splitting; Identity Privacy; BLOCK CIPHER; TAGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy. In addition, our new protocol integrates fine-grained access control and key establishment with mutual authentication. The core of our solution is the use of the concepts of key-splitting and distributed signatures to solve the validation and revocation problem. We show that our protocols can be implemented on RFID tags using lightweight implementations of elliptic curve cryptography.
引用
收藏
页码:122 / +
页数:4
相关论文
共 50 条
  • [31] EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
    GuoRui Li Ying Wang CuiRong Wang JingSha He Electronic Information Department Northeastern University at Qinhuangdao Qinhuangdao PRC Department of Information Engineering Qinhuangdao Institute of Technology Qinhuangdao PRC School of Software Engineering Beijing University of Technology Beijing PRC
    International Journal of Automation & Computing, 2012, 9 (01) : 108 - 112
  • [32] EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
    Guo-Rui Li1 Ying Wang2 Cui-Rong Wang1 Jing-Sha He3 1Electronic Information Department
    International Journal of Automation and Computing, 2012, (01) : 108 - 112
  • [33] An Efficient RFID Tag-Reader Mutual Authentication Scheme
    Zhang, Yansheng
    Li, Dancheng
    Zhu, Zhiliang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2942 - 2945
  • [34] EMAP: An Efficient Mutual Authentication Protocol for Passive RFID Tags
    Li, Guo-Rui
    Wang, Ying
    Wang, Cui-Rong
    He, Jing-Sha
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2012, 9 (01) : 108 - 112
  • [35] Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol
    Mujahid, Umar
    Jafri, Atif Raza
    Najam-ul-Islam, M.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (07)
  • [36] Vulnerability analysis of EMAP - An efficient RFID mutual authentication protocol
    Li, Tieyan
    Deng, Robert
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 238 - +
  • [37] Multi-domain certificate: A new solution of authentication and authorization
    Fang, ZY
    Gao, P
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 145 - 148
  • [38] Authentication and authorization mechanisms for multi-domain grid environments
    Cornwall L.A.
    Jensen J.
    Kelsey D.P.
    Frohner Á.
    Kouřil D.
    Bonnassieux F.
    Nicoud S.
    Lorentey K.
    Hahkala J.
    Silander M.
    Cecchini R.
    Ciaschini V.
    dell'Agnello L.
    Spataro F.
    O'Callaghan D.
    Mulmo O.
    Volpato G.L.
    Groep D.
    Steenbakkers M.
    Mcnab A.
    Journal of Grid Computing, 2004, 2 (4) : 301 - 311
  • [39] Multi-domain Security Authentication Protocol for Hybrid Cloud
    Zhang Qikun
    Zhang Lei
    Gan Yong
    Duan Zhaolei
    Zheng Jun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 323 - 336
  • [40] Identity-based authentication model for multi-domain
    State Key Laboratory of Information Security, Institute of Software, Chinese Acad. of Sci., Beijing 100080, China
    Jisuanji Xuebao, 2006, 8 (1271-1281):