Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers

被引:11
作者
Mtita, Collins [1 ,2 ]
Laurent, Maryline [1 ]
Delort, Jacques [2 ]
机构
[1] Univ Paris 11, CNRS, SAMOVAR, Telecom SudParis, 9 Rue Charles Fourier, F-91011 Evry, France
[2] TRAXENS SAS, Directorate Informat Syst, Hotel Technopt 2 Rue Marc Donadille CS80001, F-13453 Marseille, France
关键词
radiofrequency identification; cryptographic protocols; serverless radiofrequency identification; mutual authentication; secure tag search protocol; untrusted reader; RFID technology; privacy vulnerability; data collection; serverless security protocol; key establishment; CryptoVerif tool; PRIVACY;
D O I
10.1049/iet-ifs.2015.0428
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency identification (RFID) technology's potential relies on advances made by researchers for addressing the technology's security and privacy vulnerabilities, and making data collection and storage in an RFID system safe. Privacy and security are key concerns, as paramount as efficiency and reliability, in raising the confidence of end users towards RFID technologies. This study proposes two complementary lightweight and efficient serverless security protocols in the presence of untrusted RFID readers. The first one is used for mass authentication of RFID tags and supports mutual authentication with key establishment. The second one is an RFID tag search protocol that helps interacting with one specific tag surrounded by a huge number of other tags. The originality of both protocols holds that no shared parameters are required between tags and readers for mutual authentication support, they refer to the same basic material, and they have low resource demands in storage, bandwidth, energy and computation for both RFID readers and tags. Finally, the authors' protocols have been formally verified under the computational model using CryptoVerif tool.
引用
收藏
页码:262 / 271
页数:10
相关论文
共 11 条
[1]  
Blanchet B., 2011, SOFTW SAF SECUR TOOL, V33, P1
[2]  
Chatmon C., 2006, TECHNICAL REPORT
[3]   RFID tag search protocol preserving privacy of mobile reader holders [J].
Chuna, Ji Young ;
Hwang, Jung Yeon ;
Lee, Dong Hoon .
IEICE ELECTRONICS EXPRESS, 2011, 8 (02) :50-56
[4]   Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments [J].
Hoque, Md. Endadul ;
Rahman, Farzana ;
Ahamed, Sheikh I. ;
Park, Jong Hyuk .
WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) :65-79
[5]  
Jialiang H, 2014, INT J COMPUTER APPL, V7, P131
[6]   Server-less RFID authentication and searching protocol with enhanced security [J].
Lee, Chin-Feng ;
Chien, Hung-Yu ;
Laih, Chi-Sung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (03) :376-385
[7]   Security Analysis and Improvements of Authentication and Access Control in the Internet of Things [J].
Ndibanje, Bruce ;
Lee, Hoon-Jae ;
Lee, Sang-Gon .
SENSORS, 2014, 14 (08) :14786-14805
[8]  
Pourpouneh Mohsen, 2014, International Journal of Computer Network and Information Security, V7, P31, DOI 10.5815/ijcnis.2015.01.05
[9]   BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain [J].
Qi, Saiyu ;
Lu, Li ;
Li, Zhenjiang ;
Li, Mo .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (04) :234-244
[10]   A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System [J].
Srivastava, Keerti ;
Awasthi, Amit K. ;
Kaul, Sonam D. ;
Mittal, R. C. .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)