Skip to main content
Top
Published in: Wireless Networks 2/2020

09-10-2018

Cyclic group based mutual authentication protocol for RFID system

Authors: Pramod Kumar Maurya, Satya Bagchi

Published in: Wireless Networks | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Widespread deployment of RFID system arises security and privacy concerns of users. There are several proposals in the literature to avoid these concerns, but most of them provide reasonable privacy at the cost of search complexity on the server side. The search complexity increases linearly with the number of tags in the system. Some schemes use a group based approach to solve the search complexity problem. In this paper, we proposed a group based authentication protocol for RFID system which is based on some characteristics of cyclic groups. The scheme uses only bitwise XOR, circular left shift (\(\ll\)) and modulo operations for the computational work. Also, the scheme does not use any pseudo-random number generator on the tag side. We use two benchmark metric based on anonymity set to measure the privacy level of the system when some tags are compromised by an adversary. We present some simulation results which show that the scheme preserves the high level of privacy and discloses very less amount of information when some tags are compromised. Furthermore, its formal and informal analysis show that our scheme preserves information privacy as well as un-traceability and also withstand various well-known attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Avoine, G., Buttyant, L., Holczer, T., & Vajda, I. (2007). Group-based private authentication. In IEEE international symposium on a world of wireless, mobile and multimedia networks (pp. 1–6). Avoine, G., Buttyant, L., Holczer, T., & Vajda, I. (2007). Group-based private authentication. In IEEE international symposium on a world of wireless, mobile and multimedia networks (pp. 1–6).
2.
go back to reference Avoine, G., Coisel, I., & Martin, T. (2014). Untraceability model for RFID. IEEE Transactions on Mobile Computing, 13(10), 2397–2405.CrossRef Avoine, G., Coisel, I., & Martin, T. (2014). Untraceability model for RFID. IEEE Transactions on Mobile Computing, 13(10), 2397–2405.CrossRef
3.
go back to reference Buttyán, L., Holczer, T., & Vajda, I. (2006). Optimal key-trees for tree-based private authentication. Berlin: Springer.CrossRef Buttyán, L., Holczer, T., & Vajda, I. (2006). Optimal key-trees for tree-based private authentication. Berlin: Springer.CrossRef
4.
go back to reference Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47–59.CrossRef Cao, T., Chen, X., Doss, R., Zhai, J., Wise, L. J., & Zhao, Q. (2016). RFID ownership transfer protocol based on cloud. Computer Networks, 105, 47–59.CrossRef
5.
go back to reference Chien, H. Y. (2006). Secure access control schemes for RFID systems with anonymity. In 7th international conference on mobile data management (MDM’06) (pp. 1–4). Chien, H. Y. (2006). Secure access control schemes for RFID systems with anonymity. In 7th international conference on mobile data management (MDM’06) (pp. 1–4).
6.
go back to reference Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef
7.
go back to reference Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, 69(1), 58–65.MATHCrossRef Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, 69(1), 58–65.MATHCrossRef
8.
go back to reference Dimitriou, T. (2016). Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks, 37(Part 2), 195–208.MathSciNetCrossRef Dimitriou, T. (2016). Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Networks, 37(Part 2), 195–208.MathSciNetCrossRef
9.
go back to reference Gao, L., Ma, M., Shu, Y., & Wei, Y. (2014). An ultralightweight RFID authentication protocol with CRC and permutation. Journal of Network and Computer Applications, 41, 37–46.CrossRef Gao, L., Ma, M., Shu, Y., & Wei, Y. (2014). An ultralightweight RFID authentication protocol with CRC and permutation. Journal of Network and Computer Applications, 41, 37–46.CrossRef
10.
go back to reference Gallian, J. A. (2016). Contemporary abstract algebra. Boston: Cengage Learning.MATH Gallian, J. A. (2016). Contemporary abstract algebra. Boston: Cengage Learning.MATH
11.
go back to reference Juels, A., & Weis, S. A. (2009). Defining strong privacy for RFID. ACM Transactions on Information and System Security, 13(1), 7:1–7:23.CrossRef Juels, A., & Weis, S. A. (2009). Defining strong privacy for RFID. ACM Transactions on Information and System Security, 13(1), 7:1–7:23.CrossRef
12.
go back to reference Kaul, S. D., & Awasthi, A. K. (2017). Privacy model for threshold RFID system based on PUF. Wireless Personal Communications, 95(3), 2803–2828.CrossRef Kaul, S. D., & Awasthi, A. K. (2017). Privacy model for threshold RFID system based on PUF. Wireless Personal Communications, 95(3), 2803–2828.CrossRef
13.
go back to reference Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS ’04 (pp. 210–219). ACM. Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS ’04 (pp. 210–219). ACM.
14.
go back to reference Nohara, Y., Inoue, S., Baba, K., & Yasuura, H. (2005). Quantitative evaluation of unlinkable id matching schemes. In Proceedings of the 2005 ACM workshop on privacy in the electronic society, WPES ’05 (pp. 55–60). ACM. Nohara, Y., Inoue, S., Baba, K., & Yasuura, H. (2005). Quantitative evaluation of unlinkable id matching schemes. In Proceedings of the 2005 ACM workshop on privacy in the electronic society, WPES ’05 (pp. 55–60). ACM.
15.
go back to reference Nohl, K., & Evans, D. (2006). Quantifying information leakage in tree-based hash protocols information and communications security. In 8th international conference, ICICS (pp. 228–237). Nohl, K., & Evans, D. (2006). Quantifying information leakage in tree-based hash protocols information and communications security. In 8th international conference, ICICS (pp. 228–237).
16.
go back to reference Maurya, P. K., Pal, J., & Bagchi, S. (2017). A coding theory based ultralightweight RFID authentication protocol with CRC. Wireless Personal Communications, 97(1), 967–976.CrossRef Maurya, P. K., Pal, J., & Bagchi, S. (2017). A coding theory based ultralightweight RFID authentication protocol with CRC. Wireless Personal Communications, 97(1), 967–976.CrossRef
18.
go back to reference Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379, 195–210.CrossRef Rahman, F., Hoque, M. E., & Ahamed, S. I. (2017). Anonpri: A secure anonymous private authentication protocol for RFID systems. Information Sciences, 379, 195–210.CrossRef
19.
go back to reference Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1), 3–55.MathSciNetCrossRef Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1), 3–55.MathSciNetCrossRef
20.
go back to reference Srivastava, K., Awasthi, A. K., Kaul, S. D., & Mittal, R. C. (2014). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 1–5. Srivastava, K., Awasthi, A. K., Kaul, S. D., & Mittal, R. C. (2014). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems, 39(1), 1–5.
21.
go back to reference Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.CrossRef Tian, Y., Chen, G., & Li, J. (2012). A new ultralightweight RFID authentication protocol with permutation. IEEE Communications Letters, 16(5), 702–705.CrossRef
22.
go back to reference Wang, J., Floerkemeier, C., & Sarma, S. E. (2014). Session-based security enhancement of RFID systems for emerging open-loop applications. Personal and Ubiquitous Computing, 18(8), 1881–1891.CrossRef Wang, J., Floerkemeier, C., & Sarma, S. E. (2014). Session-based security enhancement of RFID systems for emerging open-loop applications. Personal and Ubiquitous Computing, 18(8), 1881–1891.CrossRef
23.
go back to reference Weis, S., Sarma, S., Rivest, R., & Engels, D. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, 2802, 201–212.CrossRef Weis, S., Sarma, S., Rivest, R., & Engels, D. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, 2802, 201–212.CrossRef
Metadata
Title
Cyclic group based mutual authentication protocol for RFID system
Authors
Pramod Kumar Maurya
Satya Bagchi
Publication date
09-10-2018
Publisher
Springer US
Published in
Wireless Networks / Issue 2/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1850-9

Other articles of this Issue 2/2020

Wireless Networks 2/2020 Go to the issue