Cloud-based Lightweight RFID Mutual Authentication Protocol

被引:10
作者
Fan, Kai [1 ]
Luo, Qi [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Shaanxi, Peoples R China
[2] Xidian Univ, Minist Educ Wide Band Gap Semicond Mat & Devices, Key Lab, Xian, Shaanxi, Peoples R China
来源
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) | 2017年
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
RFID; security; privacy; mutual authentication; cloud; SECURITY; PRIVACY;
D O I
10.1109/DSC.2017.41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying the tag or reader when reading message will have serious consequences, which may suffer many secure issues, such as intercept, modifying, replaying, DoS and synchronization. This paper puts forward an efficient and reliable RFID security authentication scheme in cloud environment. The protocol combines the logic encryption operation with timestamp, which can resist DoS attacks and anti-synchronization attacks. The proposed protocol not only can well solve the RFID security and privacy issues, but also can use the powerful cloud computing capabilities to process data.
引用
收藏
页码:333 / 338
页数:6
相关论文
共 12 条
[1]  
[Anonymous], P 1 INT C SEC PERV C
[2]  
[Anonymous], 2003, RSA Laboratories Cryptobytes
[3]  
[Anonymous], J U ELECT SCI TECHNO
[4]   RFID tag search protocol preserving privacy of mobile reader holders [J].
Chuna, Ji Young ;
Hwang, Jung Yeon ;
Lee, Dong Hoon .
IEICE ELECTRONICS EXPRESS, 2011, 8 (02) :50-56
[5]   Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments [J].
Hoque, Md. Endadul ;
Rahman, Farzana ;
Ahamed, Sheikh I. ;
Park, Jong Hyuk .
WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) :65-79
[6]  
KuBo, 2014, 2014 7 INT C INT COM, P832
[7]   Server-less RFID authentication and searching protocol with enhanced security [J].
Lee, Chin-Feng ;
Chien, Hung-Yu ;
Laih, Chi-Sung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (03) :376-385
[8]  
Ohkubo M., 2004, S CRYPTOGRAPHY INFOR, V1, P719
[9]   Enabling ubiquitous sensing with RFID [J].
Want, R .
COMPUTER, 2004, 37 (04) :84-86
[10]  
Xiao HN, 2016, IEEE TRUST BIG, P332, DOI [10.1109/TrustCom.2016.80, 10.1109/TrustCom.2016.0081]