Private and Secure Tag Access for Large-Scale RFID Systems

被引:20
作者
Sun, Min-Te [1 ]
Sakai, Kazuya [2 ]
Ku, Wei-Shinn [3 ]
Lai, Ten H. [4 ]
Vasilakos, Athanasios V. [5 ]
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[2] Tokyo Metropolitan Univ, Dept Informat & Commun Syst, 6-6 Asahigaoka, Hino, Tokyo 1910065, Japan
[3] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[4] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
[5] Lulea Univ Technol, Dept Comp Sci Elect & Space Engn, S-97187 Lulea, Sweden
关键词
RFID systems; security; privacy; skip lists;
D O I
10.1109/TDSC.2015.2427833
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The performance of key authentication and the degree of privacy in large-scale RFID systems are considered by many researchers as tradeoffs. Based on how keys are managed in the system, the privacy preserving tag authentications proposed in the past can be categorized into tree-based and group-based approaches. While a tree-based approach achieves high performance in key authentication, it suffers from the issue of low privacy should a fraction of tags be compromised. On the contrary, while group-based key authentication is relatively invulnerable to compromise attacks, it is not scalable to a large number of tags. In this paper, we propose a new private tag authentication protocol based on skip lists, named randomized skip lists-based authentication (RSLA). Without sacrificing the authentication performance, RSLA provides a high privacy preserving mechanism. While RSLA provides the same level of unpredictability-based-privacy and indistinguishability-based privacy compared with other structured key management approaches, our scheme achieves the highest system anonymity with good performance in key look up and update. In addition, the simulation results match our analyses closely.
引用
收藏
页码:657 / 671
页数:15
相关论文
共 34 条
[1]  
[Anonymous], 2003, THESIS
[2]  
Avoine G., 2007, Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, P1
[3]  
Che W., 2008, Networked RFID Systems and Lightweight Cryptography, V16, P279, DOI DOI 10.1007/978-3-540-71641-9_16
[4]  
Cimato Stelvio, 2008, 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC), P673, DOI 10.1109/COMPSAC.2008.152
[5]  
Czeskis A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P479
[6]  
Díaz C, 2003, LECT NOTES COMPUT SC, V2482, P54
[7]   A lightweight RFID protocol to protect against traceability and cloning attacks [J].
Dimitriou, T .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :59-66
[8]  
Dimitriou T, 2006, PerCom 2006: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, Proceedings, P269
[9]  
Hoque ME, 2011, INT CONF PERVAS COMP, P102, DOI 10.1109/PERCOM.2011.5767573
[10]  
Huang C., 2006, Proceedings of the IEEE International Conference on Solid-State and Integrated Circuit Technology, P1595