A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags
نویسندگان
چکیده
RFID(Radio Frequency Identification) is now being used in everything for economic feasibility and convenience. In contrast, RFID tags may infringe on user’s privacy. A number of previous schemes exploiting hash function, symmetric cryptographic primitive like AES (Advanced Encryption Standard), asymmetric cryptographic primitive like ECC (Elliptic Curve Cryptosystem) are suitable for high-end RFID. In this paper, we propose a lightweight protocol for low-cost tags to make RFID tags widespread, which requires only one cryptographic primitive, a pseudorandom number generator. Under the strong assumption that all the channels are insecure, our protocol using a proxy for individual and the universal re-encryption has several advantages: (1) ownership transfer, (2) computational time in the back-end server to find the identifier of a tag, (3) untraceability against the compromising tags, and (5) data access authorization level-based service by the back-end server.
منابع مشابه
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. However, it is a challenging task to design an authentication protocol because of the limited resource of Lightweight RFID tags. Recently, a lightweight RFID authentication protocol and an ownership transfer of RFID tags are presented by Kuls...
متن کاملRFID Security Using Lightweight Mutual Authentication And Ownership Transfer Protocol
In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that’s why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. So...
متن کاملStrong and Robust RFID Authentication Enabling Perfect Ownership Transfer
RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designin...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کامل