Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

29.04.2017

Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT

verfasst von: Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Radio Frequency Identification (RFID) and Near Field Communication systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide privacy and security requirements of RFID users in novel authentication applications, lots of security schemes have been proposed which have tried to provide secure and untraceable communication for end-users. In this paper, we investigate the privacy of three RFID security schemes which have been proposed recently. For privacy analysis, we use the well-known RFID formal privacy model proposed by Ouafi and Phan. We show that all the studied protocols have some privacy drawbacks, making them vulnerable to various traceability attacks. Moreover, in order to overcome all the reported weaknesses and prevent the presented attacks, we apply some modifications in the structures of the studied protocols and propose an improved version of each one. Our analyses show that the modified protocols are more efficient than their previous versions and new modifications can omit all the existing weaknesses on the analyzed protocols. Finally, we compare the modified protocols with some new-found RFID authentication protocols in the terms of security and privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vaudenay, S. (2007). E-passport threats. IEEE Security and Privacy, 5(6), 61–64.CrossRef Vaudenay, S. (2007). E-passport threats. IEEE Security and Privacy, 5(6), 61–64.CrossRef
2.
Zurück zum Zitat Ebrahimi-Asl, S., Ghasr, M.T.A., & Zawodniok, M. (2016). Application of low scattering antennas to RFID networks. In IEEE International Conference on RFID (RFID) (pp. 1–7). Ebrahimi-Asl, S., Ghasr, M.T.A., & Zawodniok, M. (2016). Application of low scattering antennas to RFID networks. In IEEE International Conference on RFID (RFID) (pp. 1–7).
3.
Zurück zum Zitat Ok, M.H., & Uiwang, G. (2009). A location tracking by RFID to assist the transportation vulnerable in subway stations. In 11th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering. Ok, M.H., & Uiwang, G. (2009). A location tracking by RFID to assist the transportation vulnerable in subway stations. In 11th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering.
4.
Zurück zum Zitat Ruiz-Garcia, L., & Lunadei, L. (2011). The role of RFID in agriculture: Applications, limitations and challenges. Computers and Electronics in Agriculture, 79(1), 42–50.CrossRef Ruiz-Garcia, L., & Lunadei, L. (2011). The role of RFID in agriculture: Applications, limitations and challenges. Computers and Electronics in Agriculture, 79(1), 42–50.CrossRef
5.
Zurück zum Zitat Ng, M. L., Leong, K. S., Hall, D. M., & Cole, P. H. (2005). A small passive UHF RFID tag for livestock identification. In IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications. Ng, M. L., Leong, K. S., Hall, D. M., & Cole, P. H. (2005). A small passive UHF RFID tag for livestock identification. In IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.
6.
Zurück zum Zitat Mishra, D., Das, A. K., Mukhopadhyay, S., & Wazid, M. (2016). A secure and robust smartcard-based authentication scheme for session initiation protocol using elliptic curve cryptography. Wireless Personal Communications, 91(3), 1361–1391.CrossRef Mishra, D., Das, A. K., Mukhopadhyay, S., & Wazid, M. (2016). A secure and robust smartcard-based authentication scheme for session initiation protocol using elliptic curve cryptography. Wireless Personal Communications, 91(3), 1361–1391.CrossRef
7.
Zurück zum Zitat Avoine, G. (2005). Cryptography in radio frequency identification and fair exchange protocols. Ph.D. thesis, Lausanne, University of EPFL. Avoine, G. (2005). Cryptography in radio frequency identification and fair exchange protocols. Ph.D. thesis, Lausanne, University of EPFL.
8.
Zurück zum Zitat Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.MathSciNetCrossRef Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.MathSciNetCrossRef
9.
Zurück zum Zitat Gross, H., Wenger, E., Martín, H., & Hutter, M. (2014). PIONEER: A prototype for the internet of things based on an extendable EPC Gen2 RFID tag. Radio Frequency Identification: Security and Privacy Issues, 54–73. Gross, H., Wenger, E., Martín, H., & Hutter, M. (2014). PIONEER: A prototype for the internet of things based on an extendable EPC Gen2 RFID tag. Radio Frequency Identification: Security and Privacy Issues, 54–73.
10.
Zurück zum Zitat Hada, H., & Mitsugi, J. (2011). EPC based internet of things architecture. In IEEE International Conference on RFID-Technologies and Applications (RFID-TA). Hada, H., & Mitsugi, J. (2011). EPC based internet of things architecture. In IEEE International Conference on RFID-Technologies and Applications (RFID-TA).
11.
Zurück zum Zitat Baghery, K., Abdolmaleki, B., Akhbari, B., & Aref, M. R. (2015). Enhancing privacy of recent authentication schemes for low-cost RFID systems. The ISC International Journal of Information Security, 7(2), 135–149. Baghery, K., Abdolmaleki, B., Akhbari, B., & Aref, M. R. (2015). Enhancing privacy of recent authentication schemes for low-cost RFID systems. The ISC International Journal of Information Security, 7(2), 135–149.
12.
Zurück zum Zitat Alavi, S. M., Baghery, K., Abdolmaleki, B., & Aref, M. R. (2015). Traceability analysis of recent RFID authentication protocols. Wireless Personal Communications, 83(3), 1663–1682.CrossRef Alavi, S. M., Baghery, K., Abdolmaleki, B., & Aref, M. R. (2015). Traceability analysis of recent RFID authentication protocols. Wireless Personal Communications, 83(3), 1663–1682.CrossRef
13.
Zurück zum Zitat Wang, S., Liu, S., & Chen, D. (2014). Security analysis and improvement on two RFID authentication protocols. Wireless Personal Communications, 82(1), 21–33.CrossRef Wang, S., Liu, S., & Chen, D. (2014). Security analysis and improvement on two RFID authentication protocols. Wireless Personal Communications, 82(1), 21–33.CrossRef
14.
Zurück zum Zitat Farash, M. S. (2014). Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(2), 987–1001.MathSciNetCrossRef Farash, M. S. (2014). Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(2), 987–1001.MathSciNetCrossRef
15.
Zurück zum Zitat Mishra, D. (2016). Design and analysis of a provably secure multi-server authentication scheme. Wireless Personal Communications, 86(3), 1095–1119.CrossRef Mishra, D. (2016). Design and analysis of a provably secure multi-server authentication scheme. Wireless Personal Communications, 86(3), 1095–1119.CrossRef
16.
Zurück zum Zitat Yeh, T. C., Wanga, Y. J., Kuo, T. C., & Wanga, S. S. (2010). Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications, 37, 7678–7683.CrossRef Yeh, T. C., Wanga, Y. J., Kuo, T. C., & Wanga, S. S. (2010). Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications, 37, 7678–7683.CrossRef
17.
Zurück zum Zitat Pang, L., He, L., Pei, Q., & Wang, Y. (2013). Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard. IEEE Wireless Communications and Networking Conference (WCNC), 1870–1875. Pang, L., He, L., Pei, Q., & Wang, Y. (2013). Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard. IEEE Wireless Communications and Networking Conference (WCNC), 1870–1875.
19.
Zurück zum Zitat Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of Things Journal, 1(2), 144–152.CrossRef Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of Things Journal, 1(2), 144–152.CrossRef
20.
Zurück zum Zitat Chen, Y. Y., Huang, D. C., Tsai, M. L., & Jan, J. K. (2012). A design of tamper resistant prescription RFID access control system. Journal of Medical Systems, 36(5), 2795–2801.CrossRef Chen, Y. Y., Huang, D. C., Tsai, M. L., & Jan, J. K. (2012). A design of tamper resistant prescription RFID access control system. Journal of Medical Systems, 36(5), 2795–2801.CrossRef
21.
Zurück zum Zitat Safkhani, M., Bagheri, N., & Naderi, M. (2012). On the designing of a tamper resistant prescription rfid access control system. Journal of Medical Systems, 36(6), 3995–4004.CrossRef Safkhani, M., Bagheri, N., & Naderi, M. (2012). On the designing of a tamper resistant prescription rfid access control system. Journal of Medical Systems, 36(6), 3995–4004.CrossRef
22.
Zurück zum Zitat Ha, J., Moon, S., Zhou, J., & Ha, J. (2008). A new formal proof model for RFID location privacy. Computer Security-ESORICS. Ha, J., Moon, S., Zhou, J., & Ha, J. (2008). A new formal proof model for RFID location privacy. Computer Security-ESORICS.
23.
Zurück zum Zitat Sun, D. Z., & Zhong, J. D. (2012). A hash-based RFID security protocol for strong privacy protection. IEEE Transactions on Consumer Electronics, 58(4), 1246–1252.CrossRef Sun, D. Z., & Zhong, J. D. (2012). A hash-based RFID security protocol for strong privacy protection. IEEE Transactions on Consumer Electronics, 58(4), 1246–1252.CrossRef
24.
26.
Zurück zum Zitat Juels, A., & Weis, S. (2007). Defining strong privacy for RFID. In 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Juels, A., & Weis, S. (2007). Defining strong privacy for RFID. In 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.
27.
Zurück zum Zitat Vaudenay, S. (2007). On privacy models for RFID. ASIACRYPT 2007, LNCS 4833. Vaudenay, S. (2007). On privacy models for RFID. ASIACRYPT 2007, LNCS 4833.
28.
Zurück zum Zitat Ouafi, K., & Phan, R. C. W. (2008). Privacy of recent RFID authentication protocols. In 4th International Conference on Information Security Practice and Experience (ISPEC). Ouafi, K., & Phan, R. C. W. (2008). Privacy of recent RFID authentication protocols. In 4th International Conference on Information Security Practice and Experience (ISPEC).
29.
Zurück zum Zitat Habibi, M. H., & Gardeshi, M. (2011). Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard. In 8th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC). Habibi, M. H., & Gardeshi, M. (2011). Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard. In 8th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
30.
Zurück zum Zitat Abdolmaleki, B., Baghery, K., Akhbari, B. & Aref, M. R. (2015). Cryptanalysis of two EPC-based RFID security schemes. In 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) (pp. 116–121). Abdolmaleki, B., Baghery, K., Akhbari, B. & Aref, M. R. (2015). Cryptanalysis of two EPC-based RFID security schemes. In 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) (pp. 116–121).
Metadaten
Titel
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT
verfasst von
Behzad Abdolmaleki
Karim Baghery
Shahram Khazaei
Mohammad Reza Aref
Publikationsdatum
29.04.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4145-z

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt