A Private and Scalable Authentication for RFID Systems Using Reasonable Storage

被引:43
作者
Cao, Xiaolin [1 ]
O'Neill, Maire [1 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, ECIT, Belfast, Antrim, North Ireland
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
基金
英国工程与自然科学研究理事会;
关键词
RFID; authentication; privacy; storage; hash; scalability; dynamic;
D O I
10.1109/TrustCom.2011.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, numerous authentication protocols for radio frequency identification (RFID) systems have been proposed to protect privacy. Due to the hardware resource limitation on RFID tags, the majority of these protocols are based on symmetric-key ciphers. However, most of them lack scalability at the reader side as they require a linear or logarithmic search proportional to the number of tags in the system in order to authenticate a tag. Recently proposed scalable protocols require a constant-time search and utilize hash look-up tables. However, the storage requirement of the hash-table in these protocols is very large, therefore not practical. Moreover, previous proposals do not support dynamic resizing where the number of tags changes during the life time of the RFID system. In this paper, a new Re-Hash technique is presented to reduce the hash-table storage in constant-time authentication protocols. To the best of our knowledge, it offers the smallest storage cost in comparison to previous proposals. The Re-Hash technique is also further adapted to support the dynamic scalability for RFID systems.
引用
收藏
页码:373 / 380
页数:8
相关论文
共 22 条
  • [1] Alomair B., 2010, IEEE IFIP INT C DEP
  • [2] [Anonymous], 2001, FDN CRYPTOGRAPHY
  • [3] [Anonymous], RFID PRIV WORKSH NOV
  • [4] Avoine G., 2010, WORKSH RFID SEC RFID
  • [5] Billet O, 2010, INT WORKSH FAST SOFT
  • [6] Black J., 1999, LECT NOTES COMPUTER, V1666, P79
  • [7] Black P.E., 2006, Dictionary of Algorithms and Data Structures
  • [8] Black Paul E, 2009, Dictionary of Algorithms and Data Structures [online]
  • [9] Burmester M., 2008, International Journal of Applied Cryptography, V1, P79, DOI 10.1504/IJACT.2008.021082
  • [10] Dimitriou T., 2005, SECURECOMM