A Low-cost RFID Authentication Protocol with Location Privacy Protection

被引:8
|
作者
Chen, Yu-Yi [1 ]
Lu, Jun-Chao [2 ]
Chen, Shin-, I [2 ]
Jan, Jinn-Ke [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
关键词
RFID; Authentication; Location Privacy; Threat Model;
D O I
10.1109/IAS.2009.77
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, location privacy problem is the most important issue that should he solved. In this paper, we propose a RFID authentication scheme that achieves file goal of location privacy. We also cite the threat model to analysis security threat of our protocol. Moreover, our scheme can be implemented with low-cost and high efficiency.
引用
收藏
页码:109 / +
页数:3
相关论文
共 50 条
  • [31] Low-cost authentication protocol of the RFID system using partial ID
    Li, Yong-Zhen
    Jeong, Yoon-Su
    Sun, Ning
    Lee, Sang-Ho
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1221 - 1224
  • [32] SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
    Luo, Hanguang
    Wen, Guangjun
    Su, Jian
    Huang, Zhong
    [J]. WIRELESS NETWORKS, 2018, 24 (01) : 69 - 78
  • [33] Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Mellouki, Salah Addine
    Siraj, Zeba
    Zhan, Cheng
    [J]. INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2021, 13 (02) : 1 - 11
  • [34] SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
    Hanguang Luo
    Guangjun Wen
    Jian Su
    Zhong Huang
    [J]. Wireless Networks, 2018, 24 : 69 - 78
  • [35] RFID authentication protocol for anti-counterfeiting and privacy protection
    Chen, Yung-Chin
    Wang, Wei-Lin
    Hwang, Min-Shiang
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 255 - 259
  • [36] ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    Chien, Hung-Yu
    Laih, Chi-Sung
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (10) : 848 - 853
  • [37] An Ultra-Lightweight Secure RFID Authentication Protocol for Low-Cost Tags
    Kumar, Sanjeev
    Banka, Haider
    Kaushik, Baijnath
    Sharma, Surbhi
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, : 803 - 818
  • [38] EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
    Peris-Lopez, Pedro
    Cesar Hernandez-Castro, Julio
    Estevez-Tapiador, Juan M.
    Ribagorda, Arturo
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 352 - +
  • [39] A Validated Lightweight Authentication Protocol Towards Commercial Low-Cost RFID Tags
    Mpalane, Kealeboga
    Singano, Zothile
    Lefophane, Samuel
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 260 - 267
  • [40] A Low-cost PKC-based RFID Authentication Protocol and Its Implementation
    Wei, Lili
    Luo, Zhaotong
    Qu, Qiang
    He, Qing
    Xu, Jingwei
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 415 - 419