On The Performance Bound of Structured Key-Based RFID Authentication

被引:1
|
作者
Sakai, Kazuya [1 ]
Sun, Min-Te [2 ]
Ku, Wei-Shinn [3 ]
Lai, Ten H. [4 ]
机构
[1] Tokyo Metropolitan Univ, Dept Elect Engn & Comp Sci, Asahigaoka 6-6, Tokyo 1910065, Japan
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[3] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[4] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
基金
美国国家科学基金会;
关键词
Radio Frequency Identification; RFID; privacy and security; private authentication; SYSTEMS;
D O I
10.1109/percom.2019.8767391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing fast and secure RFID private authentication with structured key management is one of the most essential components for RFID-enabled large-scale object management. Since group keys are shared by some tags in structured key-based authentication, physical tampering of tags, so called the compromise attack, may enable the adversary to obtain group keys stored in the compromised tags, which in turn can be used to distinguish other tags. All existing structured key-based protocols try to reduce the common group key effect to preserve high privacy. However, the theoretical bound of weak privacy achievable by structured key-based authentication remains unknown. In this paper, we investigate weak privacy in RFID authentication. To this end, we first formulate a mathematical model which identifies the probability of two tags being linked with respect to the number of group keys. Our model shows that the existing solutions are far from the ultimate goal in weak privacy. Then, we propose a k-neighbor graph-based RFID authentication (KNGA) protocol, where random walk over a k-neighbor graph is performed. In addition, we show that KNGA achieves the performance bound, and we then quantify the degree of privacy by anonymity. Finally, the extensive simulations demonstrate that the proposed protocol successfully achieves its design goals.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks
    Zhou, Jianhong
    Ma, Maode
    Feng, Yong
    Thuy Ngoc Nguyen
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2734 - 2751
  • [22] A Dynamic DNA for Key-based Cryptography
    Akiwate, Bahubali
    Parthiban, Latha
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 223 - 227
  • [23] RESEARCH ON KEY-BASED TRUST MODEL
    Wang, Jianjun
    Li, Jianping
    Ma, Chongming
    Peng, Jing
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 153 - 157
  • [24] SYMMETRIC KEY BASED RFID AUTHENTICATION PROTOCOL WITH A SECURE KEY-UPDATING SCHEME
    Zhu, Guangyu
    Khan, Gul N.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 353 - 357
  • [25] Cancelable key-based fingerprint templates
    Ang, R
    Safavi-Naini, R
    McAven, L
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 242 - 252
  • [26] ON THE PUBLIC KEY-BASED AUDITING METHODS
    Nguyen, Thu N. A.
    Dang, Van H.
    Nguyen, Thuc D.
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [27] SKAP-NS: A Symmetric Key-Based Authentication Protocol for 5G Network Slicing
    Yadav, Awaneesh Kumar
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (11) : 13363 - 13372
  • [28] LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication
    Yang, Yuanyuan
    Cao, Jin
    Ren, Xiongpeng
    Niu, Ben
    Zhang, Yinghui
    Li, Hui
    COMPUTER COMMUNICATIONS, 2023, 197 : 214 - 229
  • [29] A dynamic key authentication protocol for RFID system
    Mu H.
    Zheng Z.
    Mu, Haibing (hbmu@bjtu.edu.cn), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07): : 210 - 215
  • [30] A Symmetric Key based RFID Authentication Protocol using Encrypted Tag ID
    Shin, Juseok
    Park, Yongsoo
    Kim, Sungsoo
    Kim, Youngbak
    Kim, Kyungoul
    Choi, Wonseok
    Ahn, Kwangseon
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 851 - 852