Study of the Privacy Models in RFID Authentication Protocols

被引:0
|
作者
Shen, Jian [1 ,2 ]
Zheng, Wenying [3 ]
Wang, Jin [1 ,2 ]
Xia, Zhihua [1 ,2 ]
Fu, Zhangjie [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp Software, Nanjing 210044, Jiangsu, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Appl Meteorol, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
privacy model; untraceability; RFID;
D O I
10.14257/ijsia.2013.7.6.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy is a major concern in RFID systems, especially with widespread deployment of wireless enabled interconnected personal devices. In this paper, we consider privacy issues in RFID system where the authorized readers must be able to identify tags without an adversary being able to trace them, and provide a formal security model for privacy in RFID system. Under this model, we analyze the recently proposed RFID authentication protocol named anonymous RFID authentication protocol and show attacks on them that compromise the privacy.
引用
收藏
页码:345 / 353
页数:9
相关论文
共 50 条
  • [1] Privacy of recent RFID authentication protocols
    Ouafi, Khaled
    Phan, Raphael C. -W.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
  • [2] Privacy-Preserving Authorized RFID Authentication Protocols
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 108 - 122
  • [3] Relations among Notions of Privacy for RFID Authentication Protocols
    Moriyama, Daisuke
    Matsuo, Shin'ichiro
    Ohkubo, Miyako
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 225 - 235
  • [4] Study Of RFID Authentication Protocols
    Jadhao, A. G.
    Ugale, S. P.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [5] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Gholami, Vali
    Alagheband, Mandi R.
    [J]. WIRELESS NETWORKS, 2020, 26 (03) : 2153 - 2169
  • [6] The Ff-Family of Protocols for RFID-Privacy and Authentication
    Blass, Erik-Oliver
    Kurmus, Anil
    Molva, Refik
    Noubir, Guevara
    Shikfa, Abdullatif
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (03) : 466 - 480
  • [7] Privacy Analysis and Improvements of Two Recent RFID Authentication Protocols
    Baghery, Karim
    Abdolmaleki, Behzad
    Akhbari, Bahareh
    Aref, Mohammad Reza
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 137 - 142
  • [8] Provably privacy analysis and improvements of the lightweight RFID authentication protocols
    Vali Gholami
    Mahdi R. Alagheband
    [J]. Wireless Networks, 2020, 26 : 2153 - 2169
  • [9] Unified privacy analysis of new-found RFID authentication protocols
    Alagheband, Mahdi R.
    Aref, Mohammad R.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 999 - 1009
  • [10] Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols
    Avoine, Gildas
    Coisel, Iwen
    Martin, Tania
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 138 - 157