On The Performance Bound of Structured Key-Based RFID Authentication

被引:1
|
作者
Sakai, Kazuya [1 ]
Sun, Min-Te [2 ]
Ku, Wei-Shinn [3 ]
Lai, Ten H. [4 ]
机构
[1] Tokyo Metropolitan Univ, Dept Elect Engn & Comp Sci, Asahigaoka 6-6, Tokyo 1910065, Japan
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[3] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[4] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
基金
美国国家科学基金会;
关键词
Radio Frequency Identification; RFID; privacy and security; private authentication; SYSTEMS;
D O I
10.1109/percom.2019.8767391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing fast and secure RFID private authentication with structured key management is one of the most essential components for RFID-enabled large-scale object management. Since group keys are shared by some tags in structured key-based authentication, physical tampering of tags, so called the compromise attack, may enable the adversary to obtain group keys stored in the compromised tags, which in turn can be used to distinguish other tags. All existing structured key-based protocols try to reduce the common group key effect to preserve high privacy. However, the theoretical bound of weak privacy achievable by structured key-based authentication remains unknown. In this paper, we investigate weak privacy in RFID authentication. To this end, we first formulate a mathematical model which identifies the probability of two tags being linked with respect to the number of group keys. Our model shows that the existing solutions are far from the ultimate goal in weak privacy. Then, we propose a k-neighbor graph-based RFID authentication (KNGA) protocol, where random walk over a k-neighbor graph is performed. In addition, we show that KNGA achieves the performance bound, and we then quantify the degree of privacy by anonymity. Finally, the extensive simulations demonstrate that the proposed protocol successfully achieves its design goals.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security
    Rajaguru, K.
    Hansdah, R. C.
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495
  • [2] Secret key-based Authentication with a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1791 - 1795
  • [3] Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems
    Georgios Kambourakis
    Angelos Rouskas
    Stefanos Gritzalis
    EURASIP Journal on Wireless Communications and Networking, 2004 (1)
  • [4] Secret Key-Based Identification and Authentication With a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (11) : 6189 - 6203
  • [5] Intelligent home network authentication: S/key-based home device authentication
    Lee, Deok-Gyu
    You, Ilsun
    Kim, Sang-Choon
    Lee, Yun-Kyung
    Han, Jong-Wook
    Chung, Kyo-Il
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 214 - +
  • [6] Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches
    Tomasin, Stefano
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (09) : 5700 - 5712
  • [7] Authentication protocol based on key array for RFID
    Ding, Zhi-Guo
    Guo, Li
    Wang, Yu-Jie
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (03): : 722 - 726
  • [8] A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server
    Gupta, Brij B.
    Narayan, Shaifali
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2021, 33 (02) : 1 - 16
  • [9] An IdM and Key-based Authentication Method for providing Single Sign-On in IoT
    Witkovski, Adriano
    Santin, Altair
    Abreu, Vilmar
    Marynowski, Joao
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [10] Analysis and extension of S/Key-based authentication schemes for digital home networks
    You, Ilsun
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 1022 - 1033