A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system

被引:58
作者
Gope, Prosanta [1 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
RFID; Privacy; Mutual authentication; Strong anonymity; DoS attack; MUTUAL AUTHENTICATION; SCHEME; PRIVACY;
D O I
10.1016/j.cose.2015.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) system is a contactless automatic identification system using small, low-cost RFID tag to an animate or inanimate object. Because of the advantage of simultaneous recognition of massive amounts of information, it is expected to replace the traditional bar-code system. However, two major issues with an RFID system are: i) an adversary can access the tag information, which may cause privacy and forgery problems; the computational capability of the RFID tags is very limited. Although, to deal with these issues, impressive efforts have been made by designing anonymous authentication schemes with the help of lightweight cryptographic primitives such as one way hash function, symmetric key encryption/decryption, exclusive-OR. However, to the best of our knowledge none has succeeded so far. In this article, we take an initial step to shed light on the rationale underlying this prominent issue. In order to do that, we will first demonstrate that the existing lightweight cryptographic primitive based anonymous authentication protocols in RFID systems are impractical. Subsequently, we propose a realistic lightweight authentication protocol for RFID system, which can ensure various imperative security properties such as anonymity of the RFID tag, untraceability, forward security etc. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:271 / 280
页数:10
相关论文
共 25 条
[1]  
[Anonymous], 2008, EPC RAD FREQ ID PROT
[2]  
[Anonymous], 2009, Proceedings of the Second ACM Conference on Wireless Network Security, DOI DOI 10.1145/1514274.1514282
[3]  
Burmester M, 2007, CRYPTOLOGY EPRINT AR
[4]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[5]  
Cho J-S, 2012, COMPUT MATH APPL
[6]   A lightweight RFID protocol to protect against traceability and cloning attacks [J].
Dimitriou, T .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :59-66
[7]  
Finkenzeller K., 2002, RFID handbook
[8]   Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE SYSTEMS JOURNAL, 2016, 10 (04) :1370-1379
[9]   Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (04) :2231-2245
[10]   Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets [J].
Hwang, Tzonelih ;
Gope, Prosanta .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (01) :197-224