A Security and Privacy Model for Mobile RFID Systems in the Internet of Things

被引:0
作者
Zhu, Weiling [1 ]
Yu, Jianping [1 ]
Wang, Ting [1 ]
机构
[1] Shenzhen Univ, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
来源
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY | 2012年
关键词
internet of things; mobile; radio frequency identification; security and privacy model; authenticated key exchange; AUTHENTICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For the security and privacy of mobile radio frequency identification (RFID) systems in the internet of things, a novel security and privacy model is proposed in this paper. The model not only takes into account the privacy of tags and readers, but also supports tag corruption, reader corruption, multiple readers and mutual authenticated key exchange (AKE) protocols. We then propose a new AKE protocol for mobile RFID systems. Security analysis shows that the protocol is correct, secure and tag-forward private in our model. Furthermore, our protocol is efficient in terms of computation, communication rounds and functions.
引用
收藏
页码:726 / 732
页数:7
相关论文
共 15 条
[1]  
[Anonymous], 2008, P 2008 ACM S INFORM
[2]  
[Anonymous], 2010, PRIVACY PRESERVING R
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[4]  
CHEN CL, 2010, P IEEE BWCCA2010, P423
[5]  
Donggeon Lee, 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P625, DOI 10.1109/ITNG.2010.188
[6]  
Garcia FD, 2010, LECT NOTES COMPUT SC, V6035, P194, DOI 10.1007/978-3-642-12510-2_14
[7]   A Security-provable Authentication and Key Agreement Protocol in RFID System [J].
He Lei ;
Gan Yong ;
Li Na-Na ;
Cai Zeng-Yu .
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, :2078-2080
[8]  
Juels Ari., 2006, DEFINING STRONG PRIV
[9]  
LaMacchia B, 2007, LECT NOTES COMPUT SC, V4784, P1
[10]  
Lee HG, 2006, First International Conference on Availability, Reliability and Security, Proceedings, P510