SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID tags

被引:0
作者
Misra, Satyajayant [1 ]
Verma, Mayank [1 ]
Huang, Dijiang [1 ]
Xue, Guoliang [1 ]
机构
[1] Arizona State Univ, Dept Comp Sci & Engn, Tempe, AZ 85287 USA
来源
2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8 | 2009年
关键词
RFID; anonymity; authentication; logical operations; rotation operations;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose SEAS, a novel privacy preserving, anonymous authentication scheme for RFID tags, which allows the tags to use pseudonyms instead of their true identity for authentication. Using SEAS, a tag generates random numbers and uses them to create a pseudonym as its identity for authentication. The pseudonym does not reveal the identity of the tag and the pseudonyms of multiple authentications appear random and uncorrelated to the adversary. A pseudonym can only be deciphered by the back-end authentication authority to identify the tag. No other entity in the network can link the pseudonym to the identity of the tag. Our scheme is efficient, with a tag needing to perform only simple operations such as XOR, bits shifting, bits concatenation, and random number generation. We perform security analysis of our scheme to show its effectiveness against different forms of attacks. We also perform comparison of our scheme with existing schemes in terms of efficiency in the use of resources. Our scheme performs effectively, while at the same time being better than the other popular schemes in the literature in terms of cost and computation efficiency.
引用
收藏
页码:4837 / 4842
页数:6
相关论文
共 23 条
  • [1] CHATMON CHRISTY., 2006, SECURE ANONYMOUS RFI
  • [2] A lightweight RFID protocol to protect against traceability and cloning attacks
    Dimitriou, T
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 59 - 66
  • [3] Dimitriou T, 2006, PerCom 2006: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, Proceedings, P269
  • [4] DOMINIKUS S, 2005, ECRYPT WORKSH RFID L, P14
  • [5] Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
  • [6] FELDHOFER M, 2004, IEEE MELECON, V2, P759
  • [7] Feldhofer M, 2006, LECT NOTES COMPUT SC, V4277, P372
  • [8] Active attack against HB+:: a provably secure lightweight authentication protocol
    Gilbert, H
    Robshaw, M
    Sibert, H
    [J]. ELECTRONICS LETTERS, 2005, 41 (21) : 1169 - 1170
  • [9] HOPPER N, 2000, CMUCS00139 SCH COMP
  • [10] Juels A, 2005, LECT NOTES COMPUT SC, V3621, P293