A Cloud-based RFID Authentication Protocol with Insecure Communication Channels

被引:0
|
作者
Xiao, Hannan [1 ]
Alshehri, Awatif Ali [1 ]
Christianson, Bruce [1 ]
机构
[1] Univ Hertfordshire, Sch Comp Sci, Hatfield, Herts, England
关键词
RFID; Cloud-based; Authentication protocol; AVISPA; Privacy; Insecure channel; SECURITY PROTOCOLS;
D O I
10.1109/TrustCom.2016.80
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) has become a widespread technology to automatically identify objects and with the development of cloud computing, cloud-based RFID systems attract more research these days. Several cloud-based RFID authentication protocols have been proposed to address privacy and security properties in the environment where the cloud provider is untrusted therefore the tag's data are encrypted and anonymously stored in the cloud database. However, most of the cloud-based RFID authentication protocols assume secure communication channels between the reader and the cloud server. To protect data transmission between the reader and the cloud server without any help from a third party, this paper proposes a cloud-based RFID authentication protocol with insecure communication channels (cloud-RAPIC) between the reader and the cloud server. The cloud-RAPIC protocol preserves tag privacy even when the tag does not update its identification. The cloud-RAPIC protocol has been analyzed using the UPriv model and AVISPA verification tool which have proved that the protocol preserves tag privacy and protects data secrecy.
引用
收藏
页码:332 / 339
页数:8
相关论文
共 50 条
  • [31] PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION
    LAMPORT, L
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 770 - 772
  • [32] A secure quantum communication protocol using insecure public channels
    Tsai, IM
    Yu, CM
    Tu, WT
    Kuo, SY
    [J]. SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 113 - 126
  • [33] A Secure RFID Authentication Protocol with Low Communication Cost
    Rahman, Mohammad Shahriar
    Soshi, Masakazu
    Miyaji, Atsuko
    [J]. CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 559 - +
  • [34] RFID Authentication and Communication Protocol based on the Dynamic Active Tag ID and Key
    Zhang Xiaohong
    Wang Huiqin
    Bo He
    [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1913 - +
  • [35] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [36] Cloud-based authentication and key management protocol for advanced metering infrastructure in smart grid
    Arias Roman, Luis Fernando
    de Gondim, Paulo Roberto
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (12)
  • [37] An Authentication Architecture for Cloud-Based Firewalling Service
    Guenane, Fouad Amine
    Serhrouchni, Ahmed
    Pujolle, Guy
    [J]. 2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2015, : 46 - 50
  • [38] Cloud-Based Electronic Signature Authentication Issues
    Andrianova, Vera
    Efanov, Dmitry
    [J]. PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1826 - 1828
  • [39] Cloud-based Mobile System for Biometrics Authentication
    Omri, F.
    Foufou, S.
    Hamila, R.
    Jarraya, M.
    [J]. 2013 13TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS (ITST), 2013, : 325 - 330
  • [40] A Cloud-based RFID for VANET Access filtering
    Melaouene, Noussaiba
    Elmakfalji, Chaimae
    Romadi, Rahal
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 90 - 95