Keeping It Under Control: A New Authentication Scheme for RFID Tags

被引:0
作者
Li, Tongliang [1 ,2 ]
Jin, Zhigang [1 ]
Yang, Hongguang [2 ,3 ]
Si, Xiaokun [2 ,3 ]
机构
[1] Tianjin Univ, Tianjin 300072, Peoples R China
[2] Hebei Inst Appl Math, Shijiazhuang, Peoples R China
[3] SJZ JKSS Technol Co Ltd, Shijiazhuang, Peoples R China
来源
2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM) | 2010年
关键词
RFID; ownership transfer; security; privacy; mutual authentication; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasingly used Radio Frequency Identification (RFID) systems are facing with the security and privacy concerns for the illegitimate reading and potential tracking reason. Many schemes have been proposed by using of cryptographic technology, while they are lacking the people's involvement. In this paper, we propose a new crypto-based scheme that makes users involved in the tag's authentication process by using of physical privacy type assistant tags. Before identifying common tags, the reader needs to get some data from the assistant tags first. The data make the shared secret between the tag and the back-end database different. It not only keeps the tag can be read or not under user's control, but also makes the scheme safer even if the data on back-end database is revealed. Light weight block ciphers or hash functions can be employed in our scheme; a contrast of the performance is also given after the security and privacy analysis.
引用
收藏
页数:5
相关论文
共 15 条
  • [1] Datasheet Helion Technology, 2005, MD5 SHA 1 SHA 256 HA
  • [2] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [3] Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
  • [4] Fouladgar S., 2007, P 1 INT EURASIP WORK, V66, P68
  • [5] Fouladgar S., 2007, J COMMUNICATIONS, V2, P6
  • [6] Ha J, 2007, LECT NOTES COMPUT SC, V4809, P795
  • [7] Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
  • [8] A New Ultralightweight RFID Protocol with Mutual Authentication
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P. -S.
    Chen, T. -C.
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 58 - +
  • [9] Lim CH, 2006, LECT NOTES COMPUT SC, V4307, P1
  • [10] Molnar D, 2006, LECT NOTES COMPUT SC, V3897, P276