Nothing Special   »   [go: up one dir, main page]

Skip to main content

Server-Less Lightweight Authentication Protocol for RFID System

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

Abstract

The design of secure authentication protocols for RFID system is still a great challenging problem. Many authentication protocols for RFID have been presented, but most have security flaws. We analyzes the security of scheme proposed by Deng et al., and point out that this scheme can’t resist location tracking attack, and the low efficiency of the reader searches a target tag. Based on this, an improved protocol to overcome the security vulnerability of Deng’s protocol is presented. The formal proof of correctness of the improved protocol is given based on GNY logic which is one of the model logics, and finally experiments shows the improved protocol has the good efficiency of time complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tan, C.C., Sheng, B., Li, Q.: Serverless search and authentication protocols for RFID. In: 5th Annual IEEE International Conference on Pervasive Computing and Communications, pp. 3–12. IEEE Press, White Plains (2007)

    Google Scholar 

  2. Safkhani, M., Peris-Lopez, P., Bagheri, N., Naderi, M., Hernandez-Castro, J.C.: On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol. 7739, pp. 1–19. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36140-1_1

    Chapter  Google Scholar 

  3. Lin, L.C., Tsaur, S.C., Chang, K.P.: Lightweight and serverless RFID authentication and search protocol. In: 2nd IEEE International Conference on Computer and Electrical Engineering, pp. 95–99. IEEE Press, Dubai (2010)

    Google Scholar 

  4. Lee, C.F., Chien, H.Y., Laih, C.S.: Server-less RFID authentication and searching protocol with enhanced security. J. Inter. J. Commun. Syst. 25(3), 376–385 (2012)

    Article  Google Scholar 

  5. He, J.L., Xu, Y.J., Xu, Z.Q.: Secure and private protocols for server-less RFID systems. J. Inter. J. Control Autom. 7(2), 131–142 (2014)

    Article  MathSciNet  Google Scholar 

  6. Hoque, M.E., Rahman, F., Ahamed, S.I., et al.: Enhancing privacy and security of RFID system with server-less authentication and search protocols in pervasive environments. J. Wirel. Per. Commun. 55(1), 65–79 (2010)

    Article  Google Scholar 

  7. Deng, M., Yang, W., Zhu, W.: Weakness in a server-less authentication protocol for radio frequency identification. J. Mechatron. Autom. Control Syst. 237, 1055–1061 (2014)

    Article  Google Scholar 

  8. Mtita, C., Laurent, M., Delort, J.: Efficient server-less radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. J. IET. Info. Secur. 10(5), 262–271 (2016)

    Article  Google Scholar 

  9. Abdolmaleky, S., Atapoor, S., Hajighasemlou, M., et al.: A strengthened version of a Hash-based RFID server-less security scheme. J. Adv. Comput. Sci. 4(3), 18–23 (2015)

    Google Scholar 

  10. Kumar, N., Kaur, K., Misra, S.C., et al.: An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. J. Peer-to-Peer Netw. Appl. 9(5), 824–840 (2015)

    Article  Google Scholar 

  11. Nohl, K., Evans, D.: Quantifying information leakage in tree-based Hash protocols. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 228–237. Springer, Heidelberg (2006). doi:10.1007/11935308_16

    Google Scholar 

  12. Bringer, J., Chabanne, H., Icart, T.: Improved privacy of the tree-based hash protocols using physically unclonable function. In: Ostrovsky, R., De-Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 77–91. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85855-3_6

    Google Scholar 

  13. Alabrah, A., Bassiouni, M.: A tree-based authentication scheme for a cloud toll/traffic RFID system. In: 2015 IEEE Vehicular Networking Conference, pp. 108–111. IEEE Press, Kyoto (2016)

    Google Scholar 

  14. Rahman, F., Ahamed, S.I.: Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols. J. Pers. Ubiquit. Comput. 18(1), 177–188 (2014)

    Article  Google Scholar 

  15. Chen, Y., Chou, J.S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. J. Electron. Commer. Res. 15(1), 97–120 (2015)

    Article  Google Scholar 

  16. Qu, Z., Keeney, J., Robitzsch, S., et al.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. J. China Commun. 13(7), 108–116 (2016)

    Article  Google Scholar 

  17. Ouafi, K., Phan, R.C.W.: Privacy of recent RFID authentication protocols. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 263–277. Springer, Berlin Heidelberg (2008). doi:10.1007/978-3-540-79104-1_19

    Google Scholar 

  18. Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for K-barrier coverage based on integer linear programming. J. China Commun. 13(7), 16–23 (2016)

    Article  Google Scholar 

  19. Wang, B., Gu, X., Ma, L., et al.: Temperature error correction based on BP neural network in meteorological wireless sensor network. In: Sun, X., Liu, A., Chao, H.C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10040, pp. 117–132. Springer, Cham (2016). doi:10.1007/978-3-319-48674-1_11

    Google Scholar 

  20. Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. J. Secur. Commun. Netw. 9(17), 4002–4012 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiping Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, J., Zhou, Z., Wang, P. (2017). Server-Less Lightweight Authentication Protocol for RFID System. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics