Skip to main content
Erschienen in: Wireless Networks 2/2020

09.10.2018

Cyclic group based mutual authentication protocol for RFID system

verfasst von: Pramod Kumar Maurya, Satya Bagchi

Erschienen in: Wireless Networks | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Widespread deployment of RFID system arises security and privacy concerns of users. There are several proposals in the literature to avoid these concerns, but most of them provide reasonable privacy at the cost of search complexity on the server side. The search complexity increases linearly with the number of tags in the system. Some schemes use a group based approach to solve the search complexity problem. In this paper, we proposed a group based authentication protocol for RFID system which is based on some characteristics of cyclic groups. The scheme uses only bitwise XOR, circular left shift (\(\ll\)) and modulo operations for the computational work. Also, the scheme does not use any pseudo-random number generator on the tag side. We use two benchmark metric based on anonymity set to measure the privacy level of the system when some tags are compromised by an adversary. We present some simulation results which show that the scheme preserves the high level of privacy and discloses very less amount of information when some tags are compromised. Furthermore, its formal and informal analysis show that our scheme preserves information privacy as well as un-traceability and also withstand various well-known attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Avoine, G., Buttyant, L., Holczer, T., & Vajda, I. (2007). Group-based private authentication. In IEEE international symposium on a world of wireless, mobile and multimedia networks (pp. 1–6). Avoine, G., Buttyant, L., Holczer, T., & Vajda, I. (2007). Group-based private authentication. In IEEE international symposium on a world of wireless, mobile and multimedia networks (pp. 1–6).
2.
Zurück zum Zitat Avoine, G., Coisel, I., & Martin, T. (2014). Untraceability model for RFID. IEEE Transactions on Mobile Computing, 13(10), 2397–2405.CrossRef Avoine, G., Coisel, I., & Martin, T. (2014). Untraceability model for RFID. IEEE Transactions on Mobile Computing, 13(10), 2397–2405.CrossRef
3.
Zurück zum Zitat Buttyán, L., Holczer, T., & Vajda, I. (2006). Optimal key-trees for tree-based private authentication. Berlin: Springer.CrossRef Buttyán, L., Holczer, T., & Vajda, I. (2006). Optimal key-trees for tree-based private authentication. Berlin: Springer.CrossRef
4.
Zurück zum Zitat Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47–59.CrossRef Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47–59.CrossRef
5.
Zurück zum Zitat Chien, H. Y. (2006). Secure access control schemes for RFID systems with anonymity. In 7th international conference on mobile data management (MDM’06) (pp. 1–4). Chien, H. Y. (2006). Secure access control schemes for RFID systems with anonymity. In 7th international conference on mobile data management (MDM’06) (pp. 1–4).
6.
Zurück zum Zitat Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef
7.
Zurück zum Zitat Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, 69(1), 58–65.MATHCrossRef Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, 69(1), 58–65.MATHCrossRef
8.
Zurück zum Zitat Dimitriou, T. (2016). Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks, 37(Part 2), 195–208.MathSciNetCrossRef Dimitriou, T. (2016). Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks, 37(Part 2), 195–208.MathSciNetCrossRef
9.
Zurück zum Zitat Gao, L., Ma, M., Shu, Y., & Wei, Y. (2014). An ultralightweight RFID authentication protocol with CRC and permutation. Journal of Network and Computer Applications, 41, 37–46.CrossRef Gao, L., Ma, M., Shu, Y., & Wei, Y. (2014). An ultralightweight RFID authentication protocol with CRC and permutation. Journal of Network and Computer Applications, 41, 37–46.CrossRef
10.
Zurück zum Zitat Gallian, J. A. (2016). Contemporary abstract algebra. Boston: Cengage Learning.MATH Gallian, J. A. (2016). Contemporary abstract algebra. Boston: Cengage Learning.MATH
11.
Zurück zum Zitat Juels, A., & Weis, S. A. (2009). Defining strong privacy for RFID. ACM Transactions on Information and System Security, 13(1), 7:1–7:23.CrossRef Juels, A., & Weis, S. A. (2009). Defining strong privacy for RFID. ACM Transactions on Information and System Security, 13(1), 7:1–7:23.CrossRef
12.
Zurück zum Zitat Kaul, S. D., & Awasthi, A. K. (2017). Privacy model for threshold RFID system based on PUF. Wireless Personal Communications, 95(3), 2803–2828.CrossRef Kaul, S. D., & Awasthi, A. K. (2017). Privacy model for threshold RFID system based on PUF. Wireless Personal Communications, 95(3), 2803–2828.CrossRef
13.
Zurück zum Zitat Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS ’04 (pp. 210–219). ACM. Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS ’04 (pp. 210–219). ACM.
14.
Zurück zum Zitat Nohara, Y., Inoue, S., Baba, K., & Yasuura, H. (2005). Quantitative evaluation of unlinkable id matching schemes. In Proceedings of the 2005 ACM workshop on privacy in the electronic society, WPES ’05 (pp. 55–60). ACM. Nohara, Y., Inoue, S., Baba, K., & Yasuura, H. (2005). Quantitative evaluation of unlinkable id matching schemes. In Proceedings of the 2005 ACM workshop on privacy in the electronic society, WPES ’05 (pp. 55–60). ACM.
15.
Zurück zum Zitat Nohl, K., & Evans, D. (2006). Quantifying information leakage in tree-based hash protocols information and communications security. In 8th international conference, ICICS (pp. 228–237). Nohl, K., & Evans, D. (2006). Quantifying information leakage in tree-based hash protocols information and communications security. In 8th international conference, ICICS (pp. 228–237).
16.
Zurück zum Zitat Maurya, P. K., Pal, J., & Bagchi, S. (2017). A coding theory based ultralightweight RFID authentication protocol with CRC. Wireless Personal Communications, 97(1), 967–976.CrossRef Maurya, P. K., Pal, J., & Bagchi, S. (2017). A coding theory based ultralightweight RFID authentication protocol with CRC. Wireless Personal Communications, 97(1), 967–976.CrossRef
18.
Zurück zum Zitat Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379, 195–210.CrossRef Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379, 195–210.CrossRef
19.
Zurück zum Zitat Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1), 3–55.MathSciNetCrossRef Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1), 3–55.MathSciNetCrossRef
20.
Zurück zum Zitat Srivastava, K., Awasthi, A. K., Kaul, S. D., & Mittal, R. C. (2014). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 1–5. Srivastava, K., Awasthi, A. K., Kaul, S. D., & Mittal, R. C. (2014). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 1–5.
21.
Zurück zum Zitat Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.CrossRef Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.CrossRef
22.
Zurück zum Zitat Wang, J., Floerkemeier, C., & Sarma, S. E. (2014). Session-based security enhancement of RFID systems for emerging open-loop applications. Personal and Ubiquitous Computing, 18(8), 1881–1891.CrossRef Wang, J., Floerkemeier, C., & Sarma, S. E. (2014). Session-based security enhancement of RFID systems for emerging open-loop applications. Personal and Ubiquitous Computing, 18(8), 1881–1891.CrossRef
23.
Zurück zum Zitat Weis, S., Sarma, S., Rivest, R., & Engels, D. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, 2802, 201–212.CrossRef Weis, S., Sarma, S., Rivest, R., & Engels, D. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, 2802, 201–212.CrossRef
Metadaten
Titel
Cyclic group based mutual authentication protocol for RFID system
verfasst von
Pramod Kumar Maurya
Satya Bagchi
Publikationsdatum
09.10.2018
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1850-9

Weitere Artikel der Ausgabe 2/2020

Wireless Networks 2/2020 Zur Ausgabe

Neuer Inhalt