Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers
被引:11
作者:
Mtita, Collins
论文数: 0引用数: 0
h-index: 0
机构:
Univ Paris 11, CNRS, SAMOVAR, Telecom SudParis, 9 Rue Charles Fourier, F-91011 Evry, France
TRAXENS SAS, Directorate Informat Syst, Hotel Technopt 2 Rue Marc Donadille CS80001, F-13453 Marseille, FranceUniv Paris 11, CNRS, SAMOVAR, Telecom SudParis, 9 Rue Charles Fourier, F-91011 Evry, France
Mtita, Collins
[1
,2
]
论文数: 引用数:
h-index:
机构:
Laurent, Maryline
[1
]
Delort, Jacques
论文数: 0引用数: 0
h-index: 0
机构:
TRAXENS SAS, Directorate Informat Syst, Hotel Technopt 2 Rue Marc Donadille CS80001, F-13453 Marseille, FranceUniv Paris 11, CNRS, SAMOVAR, Telecom SudParis, 9 Rue Charles Fourier, F-91011 Evry, France
Delort, Jacques
[2
]
机构:
[1] Univ Paris 11, CNRS, SAMOVAR, Telecom SudParis, 9 Rue Charles Fourier, F-91011 Evry, France
[2] TRAXENS SAS, Directorate Informat Syst, Hotel Technopt 2 Rue Marc Donadille CS80001, F-13453 Marseille, France
radiofrequency identification;
cryptographic protocols;
serverless radiofrequency identification;
mutual authentication;
secure tag search protocol;
untrusted reader;
RFID technology;
privacy vulnerability;
data collection;
serverless security protocol;
key establishment;
CryptoVerif tool;
PRIVACY;
D O I:
10.1049/iet-ifs.2015.0428
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
Radio-frequency identification (RFID) technology's potential relies on advances made by researchers for addressing the technology's security and privacy vulnerabilities, and making data collection and storage in an RFID system safe. Privacy and security are key concerns, as paramount as efficiency and reliability, in raising the confidence of end users towards RFID technologies. This study proposes two complementary lightweight and efficient serverless security protocols in the presence of untrusted RFID readers. The first one is used for mass authentication of RFID tags and supports mutual authentication with key establishment. The second one is an RFID tag search protocol that helps interacting with one specific tag surrounded by a huge number of other tags. The originality of both protocols holds that no shared parameters are required between tags and readers for mutual authentication support, they refer to the same basic material, and they have low resource demands in storage, bandwidth, energy and computation for both RFID readers and tags. Finally, the authors' protocols have been formally verified under the computational model using CryptoVerif tool.
引用
收藏
页码:262 / 271
页数:10
相关论文
共 11 条
[11]
Tang CM, 2008, IEEE T WIREL COMMUN, V7, P1408, DOI [10.1109/TWC.2008.061080, 10.1109/TWC.2008.06I080]