An Improved Forward-Secure Anonymous RFID Authentication Protocol

被引:0
作者
Zhu, Han [1 ]
Zhao, Yiming [1 ]
Ding, Shenglong [1 ]
Jin, Bo [1 ]
机构
[1] Fudan Univ, Software Sch, Shanghai, Peoples R China
来源
2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2011年
关键词
RFID; Authentication protocol; Anonymity; Forward security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) technology is becoming widely used in our daily life. However, since RFID tags have extremely limited computational and storage ability, many RFID authentication protocols have security and privacy problems. In this paper, we analyze an anonymous RFID authentication protocol proposed in WiCOM'09 and find its security drawbacks. Then, we give an improved forward-secure anonymous RFID authentication protocol. The new protocol stores less data in the tag and is more efficient for the server to authenticate tags. Besides, our protocol also provides mutual authentication, untraceability, replay attack resistance and de-synchronization attack resistance.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Anonymous and lightweight secure authentication protocol for mobile Agent system
    Berguig, Yousra
    Laassiri, Jalal
    Hanaoui, Sanae
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [42] An Improved Hierarchical Group-Index based Authentication Protocol for RFID System
    Lu Zhong-ning
    He Lei
    2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 30 - 33
  • [43] A Forward Secure RFID Privacy Protection Scheme with Two-way Authentication
    Gan Yong
    He Lei
    Zhang Tao
    Li Na-na
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2262 - 2266
  • [44] Forward-Secure Hierarchical Predicate Encryption
    Nieto, Juan Manuel Gonzalez
    Manulis, Mark
    Sun, Dongdong
    COMPUTER JOURNAL, 2014, 57 (04) : 510 - 536
  • [45] Forward-Secure Linkable Ring Signatures
    Boyen, Xavier
    Haines, Thomas
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 245 - 264
  • [46] On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
    Liang, Bing
    Li, Yingjiu
    Ma, Changshe
    Li, Tieyan
    Deng, Robert
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 71 - +
  • [47] On the Tightness of Forward-Secure Signature Reductions
    Michel Abdalla
    Fabrice Benhamouda
    David Pointcheval
    Journal of Cryptology, 2019, 32 : 84 - 150
  • [48] Forward-secure threshold signature schemes
    Abdalla, M
    Miner, S
    Namprempre, C
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 441 - 456
  • [49] On the Tightness of Forward-Secure Signature Reductions
    Abdalla, Michel
    Benhamouda, Fabrice
    Pointcheval, David
    JOURNAL OF CRYPTOLOGY, 2019, 32 (01) : 84 - 150
  • [50] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) : 4281 - 4294