Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments

被引:1
|
作者
Md. Endadul Hoque
Farzana Rahman
Sheikh I. Ahamed
Jong Hyuk Park
机构
[1] Marquette University,Ubicomp lab
[2] Kyungnam University,Department of Computer Science and Engineering
来源
关键词
RFID; Authentication; Privacy; Security; Forward secrecy; Scalability; Ownership transfer;
D O I
暂无
中图分类号
学科分类号
摘要
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID) systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular tag efficiently without server’s intervention. Furthermore they are secured against major security threats.
引用
收藏
页码:65 / 79
页数:14
相关论文
共 50 条
  • [31] A review of authentication protocols for rfid security on smart healthcare
    Dearfian, Hanif Restu
    Amiruddin, Amiruddin
    [J]. TARUMANAGARA INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF TECHNOLOGY AND ENGINEERING, 2019, 508
  • [32] A Study on the Security of RFID with Enhancing Privacy Protection
    Chang, Henry Ker-Chang
    Yen, Li-Chih
    Huang, Wen-Chi
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 35 - 40
  • [33] The Ff-Family of Protocols for RFID-Privacy and Authentication
    Blass, Erik-Oliver
    Kurmus, Anil
    Molva, Refik
    Noubir, Guevara
    Shikfa, Abdullatif
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (03) : 466 - 480
  • [34] Enhancing RFID Search Protocols based on Counters
    Lim, Jihwan
    Kim, Sangjin
    Oh, Heekuck
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (02): : 657 - 669
  • [35] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Gholami, Vali
    Alagheband, Mandi R.
    [J]. WIRELESS NETWORKS, 2020, 26 (03) : 2153 - 2169
  • [36] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Vali Gholami
    Mahdi R. Alagheband
    [J]. Wireless Networks, 2020, 26 : 2153 - 2169
  • [37] Privacy Analysis and Improvements of Two Recent RFID Authentication Protocols
    Baghery, Karim
    Abdolmaleki, Behzad
    Akhbari, Bahareh
    Aref, Mohammad Reza
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 137 - 142
  • [38] Are RNGs Achilles' Heel of RFID Security and Privacy Protocols?
    Arslan, Atakan
    Kardas, Suleyman
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1355 - 1375
  • [39] Are RNGs Achilles’ Heel of RFID Security and Privacy Protocols?
    Atakan Arslan
    Süleyman Kardaş
    Sultan Aldırmaz Çolak
    Sarp Ertürk
    [J]. Wireless Personal Communications, 2018, 100 : 1355 - 1375
  • [40] Security analysis of RFID authentication for pervasive systems using model checking
    Kim, Hyun-Seok
    Oh, Jeong-Hyun
    Choi, Jin-Young
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +