CRFID: An RFID system with a cloud database as a back-end server

被引:13
|
作者
Chen, Shuai-Min [1 ]
Wu, Mu-En [2 ]
Sun, Hung-Min [1 ]
Wang, King-Hang [3 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
[3] Hong Kong Inst Technol, Hong Kong, Hong Kong, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2014年 / 30卷
关键词
Cryptography; Cloud computing; Remote accessibility; RFID; Privacy; Security; Desynchronizing attack; Tracking attack; AUTHENTICATION PROTOCOL; SECURITY;
D O I
10.1016/j.future.2013.05.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio-frequency identification (RFID) systems can benefit from cloud databases since information on thousands of tags is queried at the same time. If all RFID readers in a system query a cloud database, data consistency can easily be maintained by cloud computing. Privacy-preserving authentication (PPA) has been proposed to protect RFID security. The time complexity for searching a cloud database in an RFID system is O(N), which is obviously inefficient. Fortunately, PPA uses tree structures to manage tags, which can reduce the complexity from a linear search to a logarithmic search. Hence, tree-based PPA provides RFID scalability. However, in tree-based mechanisms, compromise of a tag may cause other tags in the system to be vulnerable to tracking attacks. Here we propose a secure and efficient privacy-preserving RFID authentication protocol that uses a cloud database as an RFID server. The proposed protocol not only withstands desynchronizing and tracking attacks, but also provides scalability with O(log N) search complexity. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:155 / 161
页数:7
相关论文
共 50 条
  • [1] Authentication protocol for RFID without back-end database
    Deng, Miao-Lei
    Wang, Yu-Lei
    Qiu, Gang
    Zhou, Li-Hua
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (04): : 59 - 62
  • [2] SQL Injections through Back-end of RFID System
    Zhang, Qiujian
    Wang, Xiaomei
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 691 - 694
  • [3] Design and Analysis of Security Protocol for RFID without Back-End Database
    Hao Yong-sheng
    Ren Shao-jie
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2015, : 1479 - 1484
  • [4] A NOVEL IOT ENABLED AUTOMATED ATTENDANCE REGISTERING SYSTEM USING RFID AND CLOUD AS BACK-END
    Krrabaj, Samedin
    Hasani, Zirije
    Fetahi, Endrit
    Canhasi, Ercan
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2021, 13 (02): : 15 - 30
  • [5] Anonymous mutual authentication protocol for RFID tag without back-end database
    Han, Song
    Dillon, Thararn S.
    Chang, Elizabeth
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 623 - 632
  • [6] An Agent Based Back-End RFID Tag Management System
    Rekleitis, Evangelos
    Rizomiliotis, Pariagiotis
    Gritzalis, Stefanos
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 165 - 176
  • [7] The Sharing Charging System Cloud Based on Bomb Back-end Cloud
    Peng Zijian
    Hu Qunqiang
    Zhu Zhenyu
    Li ZhengYing
    2019 11TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2019), 2019, : 602 - 605
  • [8] BACK-END DATABASE-SYSTEMS
    MARYANSKI, FJ
    COMPUTING SURVEYS, 1980, 12 (01) : 3 - 25
  • [9] PERFORMANCE ANALYSIS OF SEVERAL BACK-END DATABASE SYSTEM ARCHITECTURES
    HAGMANN, RB
    PERFORMANCE EVALUATION, 1983, 3 (04) : 315 - 315
  • [10] SRCE: Security protocol in RFID back-end system based on Certificate and ECDH
    Zhang Bing
    Wan Guogen
    APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 970 - +