Abstract
The design of secure authentication protocols for RFID system is still a great challenging problem. Many authentication protocols for RFID have been presented, but most have security flaws. We analyzes the security of scheme proposed by Deng et al., and point out that this scheme can’t resist location tracking attack, and the low efficiency of the reader searches a target tag. Based on this, an improved protocol to overcome the security vulnerability of Deng’s protocol is presented. The formal proof of correctness of the improved protocol is given based on GNY logic which is one of the model logics, and finally experiments shows the improved protocol has the good efficiency of time complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tan, C.C., Sheng, B., Li, Q.: Serverless search and authentication protocols for RFID. In: 5th Annual IEEE International Conference on Pervasive Computing and Communications, pp. 3–12. IEEE Press, White Plains (2007)
Safkhani, M., Peris-Lopez, P., Bagheri, N., Naderi, M., Hernandez-Castro, J.C.: On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol. 7739, pp. 1–19. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36140-1_1
Lin, L.C., Tsaur, S.C., Chang, K.P.: Lightweight and serverless RFID authentication and search protocol. In: 2nd IEEE International Conference on Computer and Electrical Engineering, pp. 95–99. IEEE Press, Dubai (2010)
Lee, C.F., Chien, H.Y., Laih, C.S.: Server-less RFID authentication and searching protocol with enhanced security. J. Inter. J. Commun. Syst. 25(3), 376–385 (2012)
He, J.L., Xu, Y.J., Xu, Z.Q.: Secure and private protocols for server-less RFID systems. J. Inter. J. Control Autom. 7(2), 131–142 (2014)
Hoque, M.E., Rahman, F., Ahamed, S.I., et al.: Enhancing privacy and security of RFID system with server-less authentication and search protocols in pervasive environments. J. Wirel. Per. Commun. 55(1), 65–79 (2010)
Deng, M., Yang, W., Zhu, W.: Weakness in a server-less authentication protocol for radio frequency identification. J. Mechatron. Autom. Control Syst. 237, 1055–1061 (2014)
Mtita, C., Laurent, M., Delort, J.: Efficient server-less radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. J. IET. Info. Secur. 10(5), 262–271 (2016)
Abdolmaleky, S., Atapoor, S., Hajighasemlou, M., et al.: A strengthened version of a Hash-based RFID server-less security scheme. J. Adv. Comput. Sci. 4(3), 18–23 (2015)
Kumar, N., Kaur, K., Misra, S.C., et al.: An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. J. Peer-to-Peer Netw. Appl. 9(5), 824–840 (2015)
Nohl, K., Evans, D.: Quantifying information leakage in tree-based Hash protocols. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 228–237. Springer, Heidelberg (2006). doi:10.1007/11935308_16
Bringer, J., Chabanne, H., Icart, T.: Improved privacy of the tree-based hash protocols using physically unclonable function. In: Ostrovsky, R., De-Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 77–91. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85855-3_6
Alabrah, A., Bassiouni, M.: A tree-based authentication scheme for a cloud toll/traffic RFID system. In: 2015 IEEE Vehicular Networking Conference, pp. 108–111. IEEE Press, Kyoto (2016)
Rahman, F., Ahamed, S.I.: Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols. J. Pers. Ubiquit. Comput. 18(1), 177–188 (2014)
Chen, Y., Chou, J.S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. J. Electron. Commer. Res. 15(1), 97–120 (2015)
Qu, Z., Keeney, J., Robitzsch, S., et al.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. J. China Commun. 13(7), 108–116 (2016)
Ouafi, K., Phan, R.C.W.: Privacy of recent RFID authentication protocols. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 263–277. Springer, Berlin Heidelberg (2008). doi:10.1007/978-3-540-79104-1_19
Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for K-barrier coverage based on integer linear programming. J. China Commun. 13(7), 16–23 (2016)
Wang, B., Gu, X., Ma, L., et al.: Temperature error correction based on BP neural network in meteorological wireless sensor network. In: Sun, X., Liu, A., Chao, H.C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10040, pp. 117–132. Springer, Cham (2016). doi:10.1007/978-3-319-48674-1_11
Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. J. Secur. Commun. Netw. 9(17), 4002–4012 (2016)
Acknowledgements
This work is supported by the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Li, J., Zhou, Z., Wang, P. (2017). Server-Less Lightweight Authentication Protocol for RFID System. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)