CRFID: An RFID system with a cloud database as a back-end server

被引:14
作者
Chen, Shuai-Min [1 ]
Wu, Mu-En [2 ]
Sun, Hung-Min [1 ]
Wang, King-Hang [3 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
[3] Hong Kong Inst Technol, Hong Kong, Hong Kong, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2014年 / 30卷
关键词
Cryptography; Cloud computing; Remote accessibility; RFID; Privacy; Security; Desynchronizing attack; Tracking attack; AUTHENTICATION PROTOCOL; SECURITY;
D O I
10.1016/j.future.2013.05.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio-frequency identification (RFID) systems can benefit from cloud databases since information on thousands of tags is queried at the same time. If all RFID readers in a system query a cloud database, data consistency can easily be maintained by cloud computing. Privacy-preserving authentication (PPA) has been proposed to protect RFID security. The time complexity for searching a cloud database in an RFID system is O(N), which is obviously inefficient. Fortunately, PPA uses tree structures to manage tags, which can reduce the complexity from a linear search to a logarithmic search. Hence, tree-based PPA provides RFID scalability. However, in tree-based mechanisms, compromise of a tag may cause other tags in the system to be vulnerable to tracking attacks. Here we propose a secure and efficient privacy-preserving RFID authentication protocol that uses a cloud database as an RFID server. The proposed protocol not only withstands desynchronizing and tracking attacks, but also provides scalability with O(log N) search complexity. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:155 / 161
页数:7
相关论文
共 18 条
[1]  
Avoine G., 2005, P SEL AR CRYPT SAC
[2]   SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].
Chien, Hung-Yu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :337-340
[3]  
Dimitriou T, 2006, PerCom 2006: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, Proceedings, P269
[4]   Security and privacy issues in e-passports [J].
Juels, A ;
Molnar, D ;
Wagner, D .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :74-85
[5]   Defining strong privacy for RFID (Extended abstract) [J].
Juels, Ari ;
Weis, Stephen A. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :342-+
[6]   Dynamic key-updating: Privacy-preserving authentication for RFID systems [J].
Lu, Li ;
Han, Jinsong ;
Hu, Lei ;
Liu, Yunhao ;
Ni, Lionel M. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, :13-+
[7]   ACTION: Breaking the Privacy Barrier for RFID Systems [J].
Lu, Li ;
Han, Jinsong ;
Xiao, Renyi ;
Liu, Yunhao .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :1953-1961
[8]   The pros and cons of RFID in supply chain management [J].
Michael, K ;
McCathie, L .
ICMB 2005: International Conference on Mobile Business, 2005, :623-629
[9]  
Molnar D, 2006, LECT NOTES COMPUT SC, V3897, P276
[10]  
Molnar D, 2004, C COMP COMM SEC ACM, P210, DOI DOI 10.1145/1030083.1030112