PAP: A privacy and authentication protocol for passive RFID tags

被引:41
作者
Liu, Alex X. [1 ]
Bailey, LeRoy A. [1 ]
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
RFID; Privacy; Authentication; Protocol design;
D O I
10.1016/j.comcom.2009.03.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Passive Radio Frequency Identification (RFID) tags, due to their ability to uniquely identify every individual item and low cost, are well suited for supply chain management and are expected to replace barcodes in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed to be scanned, subjecting them to unauthorized scanning by malicious readers and to various other attacks, including cloning attacks. Therefore, a security protocol for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags. This protocol requires little computation and achieves both privacy and authentication, making it sufficient enough for use in supply chain management; however, this protocol is also suitable for use in other RFID applications as well. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1194 / 1199
页数:6
相关论文
共 20 条
[1]  
[Anonymous], 9303 ICAO 1
[2]  
BARBER G, 2005, MILITARY COMMUNICATI, V1, P245
[3]  
Bono SC, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P1
[4]  
Eastlake D., 2001, RFC 3174
[5]  
FLOERKEMEIER C, 2004, P 2 INT S UB COMP SY
[6]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[7]   Security and privacy issues in e-passports [J].
Juels, A ;
Molnar, D ;
Wagner, D .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :74-85
[8]  
Juels A., 2003, P 10 ACM C COMPUTER, P103
[9]  
Juels A., 2004, P 2004 ACM WORKSHOP, P1
[10]  
Juels A., 2005, WORKSH PRIV ENH TECH