Randomizing RFID private authentication

  • Qingsong Yao
  • , Yong Qi
  • , Jinsong Han
  • , Jizhong Zhao
  • , Xiangyang Li
  • , Yunhao Liu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

41 Scopus citations

Abstract

Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Such designs, being efficient, often fail to achieve forward secrecy and resistance to attacks, such as compromising and desynchronization. Indeed, these attacks may still take effect even after a tag successfully finishes the authentication and key-updating procedure. To address the issue, we propose a lightweight RFID private authentication protocol, RWP, based on the random walk concept. RWP also provides the forward security and temporal resistance to the tracking attack. The analysis results show that RWP effectively enhances the security protection for RFID private authentication, and increases the authentication efficiency from O(logN) to O(1).

Original languageEnglish
Title of host publication7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009
PublisherIEEE Computer Society
ISBN (Print)9781424433049
DOIs
StatePublished - 2009
Event7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009 - Galveston, TX, United States
Duration: 9 Mar 200913 Mar 2009

Publication series

Name7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009

Conference

Conference7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009
Country/TerritoryUnited States
CityGalveston, TX
Period9/03/0913/03/09

Keywords

  • Private authentication
  • RFID
  • Random walk

Fingerprint

Dive into the research topics of 'Randomizing RFID private authentication'. Together they form a unique fingerprint.

Cite this