TY - GEN
T1 - Randomizing RFID private authentication
AU - Yao, Qingsong
AU - Qi, Yong
AU - Han, Jinsong
AU - Zhao, Jizhong
AU - Li, Xiangyang
AU - Liu, Yunhao
PY - 2009
Y1 - 2009
N2 - Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Such designs, being efficient, often fail to achieve forward secrecy and resistance to attacks, such as compromising and desynchronization. Indeed, these attacks may still take effect even after a tag successfully finishes the authentication and key-updating procedure. To address the issue, we propose a lightweight RFID private authentication protocol, RWP, based on the random walk concept. RWP also provides the forward security and temporal resistance to the tracking attack. The analysis results show that RWP effectively enhances the security protection for RFID private authentication, and increases the authentication efficiency from O(logN) to O(1).
AB - Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Such designs, being efficient, often fail to achieve forward secrecy and resistance to attacks, such as compromising and desynchronization. Indeed, these attacks may still take effect even after a tag successfully finishes the authentication and key-updating procedure. To address the issue, we propose a lightweight RFID private authentication protocol, RWP, based on the random walk concept. RWP also provides the forward security and temporal resistance to the tracking attack. The analysis results show that RWP effectively enhances the security protection for RFID private authentication, and increases the authentication efficiency from O(logN) to O(1).
KW - Private authentication
KW - RFID
KW - Random walk
UR - https://www.scopus.com/pages/publications/70349337026
U2 - 10.1109/PERCOM.2009.4912773
DO - 10.1109/PERCOM.2009.4912773
M3 - 会议稿件
AN - SCOPUS:70349337026
SN - 9781424433049
T3 - 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009
BT - 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009
PB - IEEE Computer Society
T2 - 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009
Y2 - 9 March 2009 through 13 March 2009
ER -