Skip to main content
Erschienen in: Wireless Personal Communications 3/2019

21.08.2019

Untraceable Analysis of Scalable RFID Security Protocols

verfasst von: Xiuqing Chen, Kai Ma, Deqin Geng, Jingxuan Zhai, Wei Liu, Hongwei Zhang, Tingting Zhu, Xue Piao

Erschienen in: Wireless Personal Communications | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to support robust implementation of IoT, many schemes have been done to provide privacy, anonymity, scalability and customizability. Ray et al.’s scheme and Mir et al.’s protocol are analyzed in this paper and suffer from tracing attacks. Ray et al.’s scheme is subjected to malicious impersonation attacks, and does not achieve strong forward untraceability. Then the improved protocol is proposed, which adapts quadratic residue theorem to offer better security, scalability and customizability. Finally, the improved protocol meets forward untraceability, backward untraceability and strong forward untraceability under the untraceability model, and resists reader impersonation attacks, tag impersonation attacks, and tracing attacks. The comparison results show that the improved protocol offers better security and scalability than the existing protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gautam, R., Singh, A., Karthik, K., et al. (2017). Traceability using RFID and its formulation for a kiwifruit supply chain. Computers and Industrial Engineering,103, 46–58.CrossRef Gautam, R., Singh, A., Karthik, K., et al. (2017). Traceability using RFID and its formulation for a kiwifruit supply chain. Computers and Industrial Engineering,103, 46–58.CrossRef
2.
Zurück zum Zitat Omar, H. Q., Khoshnaw, A., & Monnet, W. (2017). Smart patient management, monitoring and tracking system using radio-frequency identification (RFID) technology. In Biomedical engineering and sciences. IEEE. Omar, H. Q., Khoshnaw, A., & Monnet, W. (2017). Smart patient management, monitoring and tracking system using radio-frequency identification (RFID) technology. In Biomedical engineering and sciences. IEEE.
3.
Zurück zum Zitat Dusart, P., & Traoré, S. (2013). Lightweight authentication protocol for low-cost RFID tags. In L. Cavallaro & D. Gollmann (Eds.), WISTP 2013, LNCS (Vol. 7886, pp. 129–144). Heidelberg: Springer. Dusart, P., & Traoré, S. (2013). Lightweight authentication protocol for low-cost RFID tags. In L. Cavallaro & D. Gollmann (Eds.), WISTP 2013, LNCS (Vol. 7886, pp. 129–144). Heidelberg: Springer.
4.
Zurück zum Zitat Li, C. T., Weng, C. Y., & Lee, C. C. (2015). A Secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of Medical Systems,39(8), 1–8.CrossRef Li, C. T., Weng, C. Y., & Lee, C. C. (2015). A Secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of Medical Systems,39(8), 1–8.CrossRef
5.
Zurück zum Zitat Srivastava, K., Awasthi, A. K., Kaul, S. D., et al. (2015). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems,39(1), 1–5.CrossRef Srivastava, K., Awasthi, A. K., Kaul, S. D., et al. (2015). A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of Medical Systems,39(1), 1–5.CrossRef
6.
Zurück zum Zitat Jin, C., Xu, C., Zhang, X., et al. (2015). A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography. Journal of Medical Systems,39(3), 1–8.CrossRef Jin, C., Xu, C., Zhang, X., et al. (2015). A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography. Journal of Medical Systems,39(3), 1–8.CrossRef
7.
Zurück zum Zitat Tewari, A., & Gupta, B. B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. Journal of Supercomputing,73, 1–18.CrossRef Tewari, A., & Gupta, B. B. (2017). Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. Journal of Supercomputing,73, 1–18.CrossRef
8.
Zurück zum Zitat Gandino, F., Montrucchio, B., & Rebaudengo, M. (2017). A security protocol for RFID traceability. International Journal of Communication Systems,30(6), 1–14.CrossRef Gandino, F., Montrucchio, B., & Rebaudengo, M. (2017). A security protocol for RFID traceability. International Journal of Communication Systems,30(6), 1–14.CrossRef
9.
Zurück zum Zitat Sundaresan, S., Doss, R., Piramuthu, S., et al. (2017). A secure search protocol for low cost passive RFID tags. Computer Networks,122, 70–82.CrossRef Sundaresan, S., Doss, R., Piramuthu, S., et al. (2017). A secure search protocol for low cost passive RFID tags. Computer Networks,122, 70–82.CrossRef
10.
Zurück zum Zitat Sundaresan, S., Doss, R., & Zhou, W. (2012). A secure search protocol based on quadratic residues for EPC Class-1 Gen-2 UHF RFID tags (Vol. 2012, pp. 30–35). Sundaresan, S., Doss, R., & Zhou, W. (2012). A secure search protocol based on quadratic residues for EPC Class-1 Gen-2 UHF RFID tags (Vol. 2012, pp. 30–35).
11.
Zurück zum Zitat Gao, L., Zhang, L., & Ma, M. (2017). Low cost RFID security protocol based on rabin symmetric encryption algorithm. Wireless Personal Communications,96, 683–696.CrossRef Gao, L., Zhang, L., & Ma, M. (2017). Low cost RFID security protocol based on rabin symmetric encryption algorithm. Wireless Personal Communications,96, 683–696.CrossRef
12.
Zurück zum Zitat Abdolmaleki, B., Baghery, K., Khazaei, S., et al. (2017). Game-based privacy analysis of RFID security schemes for confident authentication in IoT. Wireless Personal Communications,95, 5057–5080.CrossRef Abdolmaleki, B., Baghery, K., Khazaei, S., et al. (2017). Game-based privacy analysis of RFID security schemes for confident authentication in IoT. Wireless Personal Communications,95, 5057–5080.CrossRef
13.
Zurück zum Zitat Efremov, S., Pilipenko, N., & Voskov, L. (2015). An integrated approach to common problems in the Internet of Things. Procedia Engineering,100(3), 1215–1223.CrossRef Efremov, S., Pilipenko, N., & Voskov, L. (2015). An integrated approach to common problems in the Internet of Things. Procedia Engineering,100(3), 1215–1223.CrossRef
14.
Zurück zum Zitat Cao, T., Chen, X., Doss, R., et al. (2016). RFID ownership transfer protocol based on cloud. Computer Networks,105, 47–59.CrossRef Cao, T., Chen, X., Doss, R., et al. (2016). RFID ownership transfer protocol based on cloud. Computer Networks,105, 47–59.CrossRef
15.
Zurück zum Zitat Xie, W., Xie, L., Zhang, C., Zhang, Q., & Tang, C. J. (2013). Cloud-based RFID authentication. In Proceedings of IEEE international conference on RFID, Apr 30–May 02, Orlando, FenLan, 2013 (pp. 168–175). Xie, W., Xie, L., Zhang, C., Zhang, Q., & Tang, C. J. (2013). Cloud-based RFID authentication. In Proceedings of IEEE international conference on RFID, Apr 30–May 02, Orlando, FenLan, 2013 (pp. 168–175).
16.
Zurück zum Zitat Doss, R., Zhou, W. L., & Yu, S. (2012). Secure RFID tag ownership transfer based on quadratic residues. IEEE Transactions on Information Forensics and Security,8(2), 390–401.CrossRef Doss, R., Zhou, W. L., & Yu, S. (2012). Secure RFID tag ownership transfer based on quadratic residues. IEEE Transactions on Information Forensics and Security,8(2), 390–401.CrossRef
17.
Zurück zum Zitat Farash, M. S., Nawaz, O., Mahmood, K., et al. (2016). A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of Medical Systems,40(7), 165.CrossRef Farash, M. S., Nawaz, O., Mahmood, K., et al. (2016). A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of Medical Systems,40(7), 165.CrossRef
18.
Zurück zum Zitat Shen, J., Tan, H., Moh, S., et al. (2016). An efficient RFID authentication protocol providing strong privacy and security. Journal of Internet Technology,17, 443–455. Shen, J., Tan, H., Moh, S., et al. (2016). An efficient RFID authentication protocol providing strong privacy and security. Journal of Internet Technology,17, 443–455.
19.
Zurück zum Zitat Wang, X., & Yuan, C. W. (2014). Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism. IET Information Security,8(3), 161–170.CrossRef Wang, X., & Yuan, C. W. (2014). Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism. IET Information Security,8(3), 161–170.CrossRef
20.
Zurück zum Zitat Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost. Computers & Mathematics with Applications,69(1), 58–65.CrossRef Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost. Computers & Mathematics with Applications,69(1), 58–65.CrossRef
21.
Zurück zum Zitat Mir, O., & Nikooghadam, M. (2015). A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health Services. Wireless Personal Communications,83(4), 1–23.CrossRef Mir, O., & Nikooghadam, M. (2015). A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health Services. Wireless Personal Communications,83(4), 1–23.CrossRef
22.
Zurück zum Zitat Ray, B. R., Abawajy, J., & Chowdhury, M. (2014). Scalable RFID security framework and protocol supporting Internet of Things. Computer Networks,67, 89–103.CrossRef Ray, B. R., Abawajy, J., & Chowdhury, M. (2014). Scalable RFID security framework and protocol supporting Internet of Things. Computer Networks,67, 89–103.CrossRef
23.
Zurück zum Zitat Yan, X., Li, Weiheng, Li, Ping, Wang, J., Hao, X., & Gong, P. (2013). A secure biometrics-based authentication scheme for telecare medicine information systems. Journal of Medical Systems,37, 9972.CrossRef Yan, X., Li, Weiheng, Li, Ping, Wang, J., Hao, X., & Gong, P. (2013). A secure biometrics-based authentication scheme for telecare medicine information systems. Journal of Medical Systems,37, 9972.CrossRef
24.
Zurück zum Zitat Trujillo-Rasua, R., & Solanas, A. (2011). Scalable trajectory-based protocol for RFID tags identification. In Proceedings of the 2011 IEEE international conference on RFID-technologies and applications (RFID-TA) (pp. 279–285). IEEE. Trujillo-Rasua, R., & Solanas, A. (2011). Scalable trajectory-based protocol for RFID tags identification. In Proceedings of the 2011 IEEE international conference on RFID-technologies and applications (RFID-TA) (pp. 279–285). IEEE.
25.
Zurück zum Zitat Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications,34(4), 556–566.CrossRef Song, B., & Mitchell, C. J. (2011). Scalable RFID security protocols supporting tag ownership transfer. Computer Communications,34(4), 556–566.CrossRef
26.
Zurück zum Zitat Erguler, I., & Anarim, E. (2012). Security flaws in a recent RFID delegation protocol. Personal and Ubiquitous Computing,16(3), 337–349.CrossRef Erguler, I., & Anarim, E. (2012). Security flaws in a recent RFID delegation protocol. Personal and Ubiquitous Computing,16(3), 337–349.CrossRef
27.
Zurück zum Zitat Trujillo-Rasua, R., Solanas, A., Pérez-Martínez, P. A., et al. (2012). Predictive protocol for the scalable identification of RFID tags through collaborative readers. Computers in Industry,63(6), 557–573.CrossRef Trujillo-Rasua, R., Solanas, A., Pérez-Martínez, P. A., et al. (2012). Predictive protocol for the scalable identification of RFID tags through collaborative readers. Computers in Industry,63(6), 557–573.CrossRef
28.
Zurück zum Zitat Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security (pp. 210–219). New York: ACM. Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security (pp. 210–219). New York: ACM.
29.
Zurück zum Zitat Chen, X., Cao, T., & Zhai, J. (2016). Untraceability analysis of two RFID authentication protocols. Chinese Journal of Electronics,25(5), 912–920.CrossRef Chen, X., Cao, T., & Zhai, J. (2016). Untraceability analysis of two RFID authentication protocols. Chinese Journal of Electronics,25(5), 912–920.CrossRef
Metadaten
Titel
Untraceable Analysis of Scalable RFID Security Protocols
verfasst von
Xiuqing Chen
Kai Ma
Deqin Geng
Jingxuan Zhai
Wei Liu
Hongwei Zhang
Tingting Zhu
Xue Piao
Publikationsdatum
21.08.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06650-1

Weitere Artikel der Ausgabe 3/2019

Wireless Personal Communications 3/2019 Zur Ausgabe

Neuer Inhalt