On The Performance Bound of Structured Key-Based RFID Authentication

被引:1
|
作者
Sakai, Kazuya [1 ]
Sun, Min-Te [2 ]
Ku, Wei-Shinn [3 ]
Lai, Ten H. [4 ]
机构
[1] Tokyo Metropolitan Univ, Dept Elect Engn & Comp Sci, Asahigaoka 6-6, Tokyo 1910065, Japan
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[3] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[4] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
基金
美国国家科学基金会;
关键词
Radio Frequency Identification; RFID; privacy and security; private authentication; SYSTEMS;
D O I
10.1109/percom.2019.8767391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing fast and secure RFID private authentication with structured key management is one of the most essential components for RFID-enabled large-scale object management. Since group keys are shared by some tags in structured key-based authentication, physical tampering of tags, so called the compromise attack, may enable the adversary to obtain group keys stored in the compromised tags, which in turn can be used to distinguish other tags. All existing structured key-based protocols try to reduce the common group key effect to preserve high privacy. However, the theoretical bound of weak privacy achievable by structured key-based authentication remains unknown. In this paper, we investigate weak privacy in RFID authentication. To this end, we first formulate a mathematical model which identifies the probability of two tags being linked with respect to the number of group keys. Our model shows that the existing solutions are far from the ultimate goal in weak privacy. Then, we propose a k-neighbor graph-based RFID authentication (KNGA) protocol, where random walk over a k-neighbor graph is performed. In addition, we show that KNGA achieves the performance bound, and we then quantify the degree of privacy by anonymity. Finally, the extensive simulations demonstrate that the proposed protocol successfully achieves its design goals.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] The Research on Mutual authentication Protocol for RFID System Based on Combined Symmetric Key
    Jiang, Jiya
    Liu, Tong
    Shi, Yanqing
    Guo, Jianwei
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 136 - 139
  • [32] RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions
    Jang, Seung-Jae
    Jung, Young-Hoon
    Min, So-Yeon
    Lee, Keun-Wang
    Jun, Moon-Seog
    GRID AND DISTRIBUTED COMPUTING, 2011, 261 : 246 - +
  • [33] RFID Authentication and Communication Protocol based on the Dynamic Active Tag ID and Key
    Zhang Xiaohong
    Wang Huiqin
    Bo He
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1913 - +
  • [34] Ephemeral Key-based Hybrid Hardware Obfuscation
    Nasir, Neelam
    Ali Malik, Arsalan
    Tahir, Ifra
    Masood, Ammar
    Riaz, Naveed
    Proceedings of 2022 19th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2022, 2022, : 646 - 652
  • [35] USB Key-Based Approach for Software Protection
    Li MeiHong
    Liu JiQiang
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL MECHATRONICS AND AUTOMATION, 2009, : 151 - 153
  • [36] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Awaneesh Kumar Yadav
    An Braeken
    Manoj Misra
    The Journal of Supercomputing, 2023, 79 : 11261 - 11299
  • [37] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Yadav, Awaneesh Kumar
    Braeken, An
    Misra, Manoj
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (10): : 11261 - 11299
  • [38] keybin Key-based Binning for Distributed Clustering
    Chen, Xinyu
    Benson, Jeremy
    Estrada, Trilce
    2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 572 - 581
  • [39] Declustering of key-based partitioned signature files
    Ciaccia, P
    Tiberio, P
    Zezula, P
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1996, 21 (03): : 295 - 338
  • [40] Key-based melody segmentation for popular songs
    Zhu, YW
    Kankanhalli, M
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 3, 2004, : 862 - 865