A secure search protocol for lightweight and low-cost RFID systems

被引:4
作者
Namin, Mojtaba Eslamnezhad [1 ]
Hosseinzadeh, Mehdi [2 ,3 ]
Bagheri, Nasour [4 ]
Khademzadeh, Ahmad [5 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran, Iran
[2] Iran Univ Med Sci, Tehran, Iran
[3] Univ Human Dev, Comp Sci, Sulaimaniyah, Iraq
[4] Shahid Rajaee Teacher Training Univ, Dept Elect Engn, Tehran, Iran
[5] Iran Telecommun Res Ctr, Tehran, Iran
关键词
RFID; Secure search; Tag search; Serverless search; Security protocols; AUTHENTICATION PROTOCOL; PRIVACY; SCHEME; SASI; TAGS;
D O I
10.1007/s11235-017-0351-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In radio frequency identification (RFID) systems, search protocols are used to find a specific item in a large number of tagged products. These protocols should be secure against RFID attacks such as traceability, impersonation, DoS and eavesdropping. Sundaresan et al. (IEEE Trans Dependable Secure Comput, 2015) presented a server-less search protocol based on 128-bits PRNG function and claimed that their method can address all vulnerabilities of previous protocols. In this paper, we prove that Sundaresan et al.'s protocol is vulnerable to traceability attack with the high probability. In addition, we present an improved protocol to solve the proposed problem and analyze its security level informally and formally based on AVISPA tool and BAN logic.
引用
收藏
页码:539 / 552
页数:14
相关论文
共 51 条
  • [21] Untraceable and Serverless RFID Authentication and Search Protocols
    Kim, Zeen
    Kim, Jangseong
    Kim, Kwangjo
    Choi, Imsung
    Shon, Taeshik
    [J]. 2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 278 - 283
  • [22] Lightweight Secure Search Protocols for Low-cost RFID Systems
    Kulseng, Lars
    Yu, Zhen
    Wei, Yawen
    Guan, Yong
    [J]. 2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2009, : 40 - 48
  • [23] Lai CZ, 2013, CHINA COMMUN, V10, P105, DOI 10.1109/CC.2013.6457534
  • [24] Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification
    Lai, Yuan-Cheng
    Hsiao, Ling-Yen
    Lin, Bor-Shen
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (01) : 255 - 268
  • [25] Server-less RFID authentication and searching protocol with enhanced security
    Lee, Chin-Feng
    Chien, Hung-Yu
    Laih, Chi-Sung
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (03) : 376 - 385
  • [26] Lee YK, 2010, WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P55
  • [27] A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Lin, Iuon-Chang
    Hsu, Hung-Huei
    Cheng, Chen-Yang
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) : 978 - 997
  • [28] Lightweight and Server less RFID Authentication and Search Protocol
    Lin, Iuon-Chang
    Tsaur, Shih-Chang
    Chang, Kai-Ping
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 95 - +
  • [29] Exploiting the prefix information to enhance the performance of FSA-based RFID systems
    Lin, Xiao-Hui
    Wang, Hui
    Kwok, Yu-Kwong
    Chen, Bin
    Dai, Mingjun
    Zhang, Li
    [J]. COMPUTER COMMUNICATIONS, 2015, 56 : 108 - 118
  • [30] STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems
    Liu, Xuan
    Xiao, Bin
    Zhang, Shigeng
    Bu, Kai
    Chan, Alvin
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (11) : 3265 - 3277