Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments

被引:1
|
作者
Md. Endadul Hoque
Farzana Rahman
Sheikh I. Ahamed
Jong Hyuk Park
机构
[1] Marquette University,Ubicomp lab
[2] Kyungnam University,Department of Computer Science and Engineering
来源
关键词
RFID; Authentication; Privacy; Security; Forward secrecy; Scalability; Ownership transfer;
D O I
暂无
中图分类号
学科分类号
摘要
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID) systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular tag efficiently without server’s intervention. Furthermore they are secured against major security threats.
引用
收藏
页码:65 / 79
页数:14
相关论文
共 50 条
  • [1] Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments
    Hoque, Md. Endadul
    Rahman, Farzana
    Ahamed, Sheikh I.
    Park, Jong Hyuk
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 65 - 79
  • [2] Serverless search and authentication protocols for RFID
    Tan, Chiu C.
    Sheng, Bo
    Li, Qun
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 3 - +
  • [3] Secure and serverless RFID authentication and search protocols
    Tan, Chin C.
    Sheng, Bo
    Li, Qun
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) : 1400 - 1407
  • [4] Untraceable and Serverless RFID Authentication and Search Protocols
    Kim, Zeen
    Kim, Jangseong
    Kim, Kwangjo
    Choi, Imsung
    Shon, Taeshik
    [J]. 2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 278 - 283
  • [5] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [6] Privacy of recent RFID authentication protocols
    Ouafi, Khaled
    Phan, Raphael C. -W.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
  • [7] A Revised Serverless Authentication Protocol with Forward Security for RFID
    He Lei
    Gan Yong
    Li Na-na
    Zhang Tao
    [J]. APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2267 - 2272
  • [8] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [9] A Study of Authentication Protocols for Security of Mobile RFID (M-RFID) System
    Noor, Noriani Mohammed
    Kamardin, Kamilia
    Sam, Suriani Mohd
    Abas, Hafiza
    Sjarif, Nilam Nur Amir
    Yusof, Yusnaidi Md
    Azmi, Azri
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, ELECTRONIC AND SYSTEMS ENGINEERING (ICAEES), 2016, : 339 - 343
  • [10] Study of the Privacy Models in RFID Authentication Protocols
    Shen, Jian
    Zheng, Wenying
    Wang, Jin
    Xia, Zhihua
    Fu, Zhangjie
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 345 - 353