Scalable RFID security protocols supporting tag ownership transfer

被引:73
作者
Song, Boyeon [1 ]
Mitchell, Chris J. [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Pseudonym; Authentication; Scalability; PRIVACY;
D O I
10.1016/j.comcom.2010.02.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We identify privacy, security and performance requirements for radio frequency identification (RFID) protocols, as well as additional functional requirements such as tag ownership transfer. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. In support of scalability, some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings. We propose a novel scalable RFID authentication protocol based on the scheme presented in Song and Mitchell (2009) [1], that takes constant time to authenticate a tag. We also propose secret update protocols for tag ownership and authorisation transfer. The proposed protocols possess the identified privacy, security and performance properties and meet the requirements for secure ownership transfer identified here. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:556 / 566
页数:11
相关论文
共 33 条
  • [1] Avoine G, 2005, LECT NOTES COMPUT SC, V3570, P125
  • [2] A scalable and provably secure hash-based RFID protocol
    Avoine, G
    Oechslin, P
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
  • [3] AVOINE G, 2005, THESIS ECOLE POLYTEC
  • [4] Bondi A. B., 2000, Proceedings Second International Workshop on Software and Performance. WOSP2000, P195, DOI 10.1145/350391.350432
  • [5] Burmester M., 2008, International Journal of Applied Cryptography, V1, P79, DOI 10.1504/IJACT.2008.021082
  • [6] CAI S, 2009, 2 ACM C WIR NETW SEC, P51
  • [7] Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    Chien, Hung-Yu
    Chen, Che-Hao
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 254 - 259
  • [8] A lightweight RFID protocol to protect against traceability and cloning attacks
    Dimitriou, T
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 59 - 66
  • [9] DUC DN, 2006, S CRYPT INF SEC SCIS
  • [10] Fouladgar S., 2007, P 1 INT EURASIP WORK, V66, P68