New authentication/ownership transfer protocol for RFID objects

被引:8
作者
Aghili, Seyed Farhad [1 ]
Mala, Hamid [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Dept Informat Technol Engn, Hezar Jerib St, Esfahan 8174673441, Iran
关键词
RFID; EPC-C1G2; Ownership transfer; Tag traceability attack; New owner privacy; OWNERSHIP TRANSFER;
D O I
10.1016/j.jisa.2019.102401
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, researchers have proposed many authentication protocols for RFID tagged objects supporting tag ownership transfer. In this paper, first we present a tag traceability attack on a recent authentication protocol, called LSDARP+, proposed to enhance its predecessor, known as the LSDARP protocol. The LSDARP protocol is based on a sliding window mechanism with two important "authentication" and "ownership transfer" phases. We also show that LSDARP's ownership transfer phase fails to protect new owner privacy. Moreover, we present our proposal for improving the security of these protocols. The proposed protocol has two phases, the "authentication" phase which is based on the sliding window mechanism, and a dedicated "generating new shared keys for new owner" phase. Finally, we show that our proposed protocol is secure and lightweight enough for the EPC-C1G2 standard. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 34 条
[1]  
[Anonymous], CLASS 1 GEN 2 UHF ST
[2]   Quark: A Lightweight Hash [J].
Aumasson, Jean-Philippe ;
Henzen, Luca ;
Meier, Willi ;
Naya-Plasencia, Maria .
JOURNAL OF CRYPTOLOGY, 2013, 26 (02) :313-339
[3]  
Bagheri N, 2018, INT ARAB J INF TECHN, V15, P87
[4]   Fast Multivariate Signature Generation in Hardware: The Case of Rainbow [J].
Balasubramanian, Sundar ;
Bogdanov, Andrey ;
Rupp, Andy ;
Ding, Jintai ;
Carter, Harold W. .
PROCEEDINGS OF THE SIXTEENTH IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, 2008, :281-+
[5]  
Berbain C, 2006, LECT NOTES COMPUT SC, V4047, P15
[6]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[7]   An Ownership Transfer Scheme Using Mobile RFIDs [J].
Chen, Chin-Ling ;
Chien, Chih-Feng .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (03) :1093-1119
[8]   Attacks on and Countermeasures for Two RFID Protocols [J].
Chen, Xiuqing ;
Cao, Tianjie ;
Doss, Robin ;
Zhai, Jingxuan .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) :5825-5848
[9]   Untraceability Analysis of Two RFID Authentication Protocols [J].
Chen Xiuqing ;
Cao Tianjie ;
Zhai Jingxuan .
CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (05) :912-920
[10]  
Cheng S., 2013, CRYPTOL INF SECUR SE, V11, P31, DOI [10.3233/978-1-61499-328-5-31, DOI 10.3233/978-1-61499-328-5-31]