Constructing effective lightweight privacy protection in RFID-based systems

被引:0
|
作者
Po-Jen Chuang
Yen-Feng Tu
机构
[1] Tamkang University,Department of Electrical and Computer Engineering
来源
关键词
Radio frequency identification (RFID); Security and privacy; Lightweight authentication protocols; BAN logic; ProVerif; OPNET;
D O I
暂无
中图分类号
学科分类号
摘要
RFID systems usually involve passive tags (with limited computing and storage capacity) to secure data exchange via wireless communication. This paper builds an effective lightweight privacy protection authentication protocol, over the XCro, rotation and XOR functions, to handle the privacy and security problems in RFID systems. We employ both BAN Logic and ProVerif to prove that the new protocol is secure, its writing logic is correct, the query results are true and the protocol is free of all common attacks. We also conduct the OPNET simulation to evaluate the performance of our protocol and the existing lightweight protocol of Fan, in terms of authentication time, throughput, bandwidth consumption rate and queuing delay. The obtained results show that our protocol is more secure and effective—because we can resist all of the mentioned common attacks by a more efficient authentication process which involves less calculations, communications and transmissions.
引用
收藏
页码:9658 / 9688
页数:30
相关论文
共 50 条
  • [41] OpenTag: Privacy Protection for RFID
    Holtzman, Henry
    Lee, Sanghoon
    Shen, Daniel
    IEEE PERVASIVE COMPUTING, 2009, 8 (02) : 71 - 77
  • [42] A potential weakness in RFID-based Internet-of-things systems
    Erguler, Imran
    PERVASIVE AND MOBILE COMPUTING, 2015, 20 : 115 - 126
  • [43] RFID-based Locating Management
    Gu, Xuan
    Wang, Dong
    Sheng, Huanye
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 18 - 23
  • [44] RFID-Based Smart Freezer
    Soylemezoglu, Ahmet
    Zawodniok, Maciej J.
    Jagannathan, S.
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (07) : 2347 - 2356
  • [45] Ethical consumerism, supply chains, and deceptions with RFID-based systems
    Tu, Yu-Ju
    Piramuthu, Selwyn
    INFORMATION & MANAGEMENT, 2024, 61 (06)
  • [46] Implementation issues in RFID-based anti-counterfeiting systems
    Cheung, H. H.
    Choi, S. H.
    COMPUTERS IN INDUSTRY, 2011, 62 (07) : 708 - 718
  • [47] UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
    Rakesh Kumar
    Sunil K. Singh
    D. K. Lobiyal
    The Journal of Supercomputing, 2024, 80 : 942 - 969
  • [48] Hospital Automation RFID-Based
    Florentino, Gustavo H. P.
    Bezerra, Heitor U.
    Junior, Helio B. de A.
    Araujo, Marcelo X.
    Valentim, Ricardo A. de M.
    Morais, Antonio H. F.
    Jesus, Tiago O.
    Guerreiro, Ana M. G.
    Brandao, Glaucio B.
    Paz de Araujo, Carlos A.
    2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 1438 - +
  • [49] RFID-Based Book Finder
    Toivanen, Lasse
    Heino, Mikko
    Oksman, Aapo
    Vienamo, Aapo
    Holopainen, Jari
    Viikari, Ville
    IEEE ANTENNAS AND PROPAGATION MAGAZINE, 2016, 58 (03) : 72 - 80
  • [50] UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
    Kumar, Rakesh
    Singh, Sunil K.
    Lobiyal, D. K.
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (01): : 942 - 969