A secure search protocol for lightweight and low-cost RFID systems

被引:4
作者
Namin, Mojtaba Eslamnezhad [1 ]
Hosseinzadeh, Mehdi [2 ,3 ]
Bagheri, Nasour [4 ]
Khademzadeh, Ahmad [5 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran, Iran
[2] Iran Univ Med Sci, Tehran, Iran
[3] Univ Human Dev, Comp Sci, Sulaimaniyah, Iraq
[4] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran, Iran
[5] Iran Telecommun Res Ctr, Tehran, Iran
关键词
RFID; Secure search; Tag search; Serverless search; Security protocols; AUTHENTICATION PROTOCOL; PRIVACY; SCHEME; SASI; TAGS;
D O I
10.1007/s11235-017-0351-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In radio frequency identification (RFID) systems, search protocols are used to find a specific item in a large number of tagged products. These protocols should be secure against RFID attacks such as traceability, impersonation, DoS and eavesdropping. Sundaresan et al. (IEEE Trans Dependable Secure Comput, 2015) presented a server-less search protocol based on 128-bits PRNG function and claimed that their method can address all vulnerabilities of previous protocols. In this paper, we prove that Sundaresan et al.'s protocol is vulnerable to traceability attack with the high probability. In addition, we present an improved protocol to solve the proposed problem and analyze its security level informally and formally based on AVISPA tool and BAN logic.
引用
收藏
页码:539 / 552
页数:14
相关论文
共 51 条
  • [1] Privacy - aware average speed monitoring system for vehicular ad-hoc networks
    Alcaide, Almudena
    Palomar, Esther
    Fuentes, Jose M.
    Gonzalez-Manzano, Lorena
    [J]. IET INTELLIGENT TRANSPORT SYSTEMS, 2015, 9 (03) : 293 - 305
  • [2] Anantrasirichai N., 2014, P IEEE INT C EL COMM, P1, DOI DOI 10.1109/ECS.2014.6892696
  • [3] Ben Ameur S, 2014, IEEE I C NETW INFRAS, P61, DOI 10.1109/ICNIDC.2014.7000266
  • [4] Security Analysis of the SASI Protocol
    Cao, Tianjie
    Bertino, Elisa
    Lei, Hong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 73 - 77
  • [5] Vulnerability aware graphs for RFID protocol security benchmarking
    Chang, Shan
    Lu, Li
    Liu, Xiaoqiang
    Song, Hui
    Yao, Qingsong
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (06) : 1027 - 1041
  • [6] Chao Lv, 2012, International Journal of Radio Frequency Identification Technology and Applications, V4, P3, DOI 10.1504/IJRFITA.2012.044646
  • [7] An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel
    Chen, Min
    Luo, Wen
    Mo, Zhen
    Chen, Shigang
    Fang, Yuguang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) : 703 - 716
  • [8] SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 337 - 340
  • [9] RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting
    Choi, S. H.
    Yang, B.
    Cheung, H. H.
    Yang, Y. X.
    [J]. COMPUTERS IN INDUSTRY, 2015, 68 : 148 - 161
  • [10] RFID tag search protocol preserving privacy of mobile reader holders
    Chuna, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. IEICE ELECTRONICS EXPRESS, 2011, 8 (02): : 50 - 56