Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments

被引:1
|
作者
Md. Endadul Hoque
Farzana Rahman
Sheikh I. Ahamed
Jong Hyuk Park
机构
[1] Marquette University,Ubicomp lab
[2] Kyungnam University,Department of Computer Science and Engineering
来源
关键词
RFID; Authentication; Privacy; Security; Forward secrecy; Scalability; Ownership transfer;
D O I
暂无
中图分类号
学科分类号
摘要
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID) systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular tag efficiently without server’s intervention. Furthermore they are secured against major security threats.
引用
收藏
页码:65 / 79
页数:14
相关论文
共 50 条
  • [41] Security analysis of RFID authentication for pervasive systems using model checking
    Kim, Hyun-Seok
    Oh, Jeong-Hyun
    Choi, Jin-Young
    [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +
  • [42] Security Flaws in Authentication Protocols with Anonymity for Wireless Environments
    Xu, Jing
    Feng, Dengguo
    [J]. ETRI JOURNAL, 2009, 31 (04) : 460 - 462
  • [43] Security analysis of two recently proposed RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhao, Meng
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
  • [44] A Privacy and Authentication Protocol for Mobile RFID System
    Huang, Hui-Feng
    Yu, Po-Kai
    Liu, Kuo-Ching
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON INDEPENDENT COMPUTING (ISIC), 2014, : 84 - 89
  • [45] Security analysis of two recently proposed RFID authentication protocols
    Chao Lv
    Hui Li
    Jianfeng Ma
    Meng Zhao
    [J]. Frontiers of Computer Science in China, 2011, 5 : 335 - 340
  • [46] An Efficient RFID Authentication Protocol Providing Strong Privacy and Security
    Shen, Jian
    Tan, Haowen
    Moh, Sangman
    Chung, Ilyong
    Wang, Jin
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (03): : 443 - 455
  • [47] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    [J]. PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [48] Security and privacy on authentication protocol for low-cost RFID
    Li, Yong-Zhen
    Cho, Young-Bok
    Um, Nam-Kyoung
    Lee, Sang-Ho
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
  • [49] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    [J]. Wireless Personal Communications, 2013, 69 : 1583 - 1596
  • [50] Unified privacy analysis of new-found RFID authentication protocols
    Alagheband, Mahdi R.
    Aref, Mohammad R.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 999 - 1009