Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems

被引:0
作者
Xu, Guangquan [1 ]
Ren, Yuanyuan [1 ]
Han, Yuanbin [2 ]
Li, Xiaohong [1 ]
Feng, Zhiyong [1 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin Key Lab Cognit Comp & Applicat, Tianjin 300350, Peoples R China
[2] Hebei Univ Engn, Sch Informat & Elect Engn, Handan 056038, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy Enhancement Model (PEM); Radio Frequency Identification (RFID); Combined Public Key (CPK); Two-Factor Authentication Protocol (TFAP); Two-way Authentication;
D O I
10.1587/transinf.2015INP0007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of things (IoT), Radio Frequency Identification (RFID) has become one of the most significant information technologies in the 21st century. However, more and more privacy threats and security flaws have been emerging in various vital RFID systems. Traditional RFID systems only focus attention on foundational implementation, which lacks privacy protection and effective identity authentication. To solve the privacy protection problem this paper proposes a privacy protection method with a Privacy Enhancement Model for RFID (PEM4RFID). PEM4RFID utilizes a "2 + 2"identity authentication mechanism, which includes a Two-Factor Authentication Protocol (TFAP) based on "two-way authentication". Our TFAP employs "hardware information + AES-ECC encryption", while the ""two-way authentication"is based on improved Combined Public Key (CPK). Case study shows that our proposed PEM4RFID has characteristics of untraceability and nonrepeatability of instructions, which realizes a good trade-off between privacy and security in RFID systems.
引用
收藏
页码:2019 / 2026
页数:8
相关论文
共 22 条
[1]  
BONEH D, 2001, ADV CRYPTOLOGY
[2]  
Chen H.P., 2007, CHINA INFORM SECURIT, V29, P47
[3]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[4]  
JOHNSON D, 1999, 9934 CORR
[5]  
Jurisic A, 1997, DR DOBBS J, V22, P26
[6]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[7]  
Miller V., 1986, USE ELLIPTIC CURVES
[8]  
Miri A, 2013, ADVANCED SECURITY AND PRIVACY FOR RFID TECHNOLOGIES, P1, DOI 10.4018/978-1-4666-3685-9
[9]  
Nan X.H., 2006, CHINA INFORM SECURIT, V28, P12
[10]  
Nan X.H., 2008, CHINA INFORM SECURIT, V30, P21