A Cloud-based RFID Authentication Protocol with Insecure Communication Channels

被引:0
|
作者
Xiao, Hannan [1 ]
Alshehri, Awatif Ali [1 ]
Christianson, Bruce [1 ]
机构
[1] Univ Hertfordshire, Sch Comp Sci, Hatfield, Herts, England
关键词
RFID; Cloud-based; Authentication protocol; AVISPA; Privacy; Insecure channel; SECURITY PROTOCOLS;
D O I
10.1109/TrustCom.2016.80
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) has become a widespread technology to automatically identify objects and with the development of cloud computing, cloud-based RFID systems attract more research these days. Several cloud-based RFID authentication protocols have been proposed to address privacy and security properties in the environment where the cloud provider is untrusted therefore the tag's data are encrypted and anonymously stored in the cloud database. However, most of the cloud-based RFID authentication protocols assume secure communication channels between the reader and the cloud server. To protect data transmission between the reader and the cloud server without any help from a third party, this paper proposes a cloud-based RFID authentication protocol with insecure communication channels (cloud-RAPIC) between the reader and the cloud server. The cloud-RAPIC protocol preserves tag privacy even when the tag does not update its identification. The cloud-RAPIC protocol has been analyzed using the UPriv model and AVISPA verification tool which have proved that the protocol preserves tag privacy and protects data secrecy.
引用
收藏
页码:332 / 339
页数:8
相关论文
共 50 条
  • [1] Secure Improved Cloud-Based RFID Authentication Protocol
    Abughazalah, Sarah
    Markantonakis, Konstantinos
    Mayes, Keith
    [J]. DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 147 - 164
  • [2] Cloud-based Lightweight RFID Mutual Authentication Protocol
    Fan, Kai
    Luo, Qi
    Li, Hui
    Yang, Yintang
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 333 - 338
  • [3] Cloud-based RFID Authentication
    Xie, Wei
    Xie, Lei
    Zhang, Chen
    Zhang, Quan
    Tang, Chaojing
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 168 - 175
  • [4] A study on secure RFID authentication protocol in insecure communication
    Park, Jang-Su
    Kang, Soo-Young
    Lee, Im-Yeong
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 133 - 143
  • [5] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Iuon-Chang Lin
    Hung-Huei Hsu
    Chen-Yang Cheng
    [J]. Journal of Network and Systems Management, 2015, 23 : 978 - 997
  • [6] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    Cheng, Chen-Yang
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) : 978 - 997
  • [7] RFID authentication protocol using ID synchronization in insecure communication
    Park, Jang-Su
    Lee, Im-Yeong
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 664 - +
  • [8] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    [J]. INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [9] Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud
    Dong, Qingkuan
    Tong, Jiaqing
    Chen, Yuan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [10] ECC certificate for authentication in Cloud-based RFID
    Chaimae, Elmakfalji
    Rahal, Romadi
    Abdellatif, El Afia
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 200 - 203