Part of the book series:Lecture Notes in Computer Science ((LNISA,volume 10603))
Included in the following conference series:
2700Accesses
Abstract
The design of secure authentication protocols for RFID system is still a great challenging problem. Many authentication protocols for RFID have been presented, but most have security flaws. We analyzes the security of scheme proposed by Deng et al., and point out that this scheme can’t resist location tracking attack, and the low efficiency of the reader searches a target tag. Based on this, an improved protocol to overcome the security vulnerability of Deng’s protocol is presented. The formal proof of correctness of the improved protocol is given based on GNY logic which is one of the model logics, and finally experiments shows the improved protocol has the good efficiency of time complexity.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 11439
- Price includes VAT (Japan)
- Softcover Book
- JPY 14299
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tan, C.C., Sheng, B., Li, Q.: Serverless search and authentication protocols for RFID. In: 5th Annual IEEE International Conference on Pervasive Computing and Communications, pp. 3–12. IEEE Press, White Plains (2007)
Safkhani, M., Peris-Lopez, P., Bagheri, N., Naderi, M., Hernandez-Castro, J.C.: On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. In: Hoepman, J.-H., Verbauwhede, I. (eds.) RFIDSec 2012. LNCS, vol. 7739, pp. 1–19. Springer, Heidelberg (2013). doi:10.1007/978-3-642-36140-1_1
Lin, L.C., Tsaur, S.C., Chang, K.P.: Lightweight and serverless RFID authentication and search protocol. In: 2nd IEEE International Conference on Computer and Electrical Engineering, pp. 95–99. IEEE Press, Dubai (2010)
Lee, C.F., Chien, H.Y., Laih, C.S.: Server-less RFID authentication and searching protocol with enhanced security. J. Inter. J. Commun. Syst.25(3), 376–385 (2012)
He, J.L., Xu, Y.J., Xu, Z.Q.: Secure and private protocols for server-less RFID systems. J. Inter. J. Control Autom.7(2), 131–142 (2014)
Hoque, M.E., Rahman, F., Ahamed, S.I., et al.: Enhancing privacy and security of RFID system with server-less authentication and search protocols in pervasive environments. J. Wirel. Per. Commun.55(1), 65–79 (2010)
Deng, M., Yang, W., Zhu, W.: Weakness in a server-less authentication protocol for radio frequency identification. J. Mechatron. Autom. Control Syst.237, 1055–1061 (2014)
Mtita, C., Laurent, M., Delort, J.: Efficient server-less radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. J. IET. Info. Secur.10(5), 262–271 (2016)
Abdolmaleky, S., Atapoor, S., Hajighasemlou, M., et al.: A strengthened version of a Hash-based RFID server-less security scheme. J. Adv. Comput. Sci.4(3), 18–23 (2015)
Kumar, N., Kaur, K., Misra, S.C., et al.: An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. J. Peer-to-Peer Netw. Appl.9(5), 824–840 (2015)
Nohl, K., Evans, D.: Quantifying information leakage in tree-based Hash protocols. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 228–237. Springer, Heidelberg (2006). doi:10.1007/11935308_16
Bringer, J., Chabanne, H., Icart, T.: Improved privacy of the tree-based hash protocols using physically unclonable function. In: Ostrovsky, R., De-Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 77–91. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85855-3_6
Alabrah, A., Bassiouni, M.: A tree-based authentication scheme for a cloud toll/traffic RFID system. In: 2015 IEEE Vehicular Networking Conference, pp. 108–111. IEEE Press, Kyoto (2016)
Rahman, F., Ahamed, S.I.: Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols. J. Pers. Ubiquit. Comput.18(1), 177–188 (2014)
Chen, Y., Chou, J.S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. J. Electron. Commer. Res.15(1), 97–120 (2015)
Qu, Z., Keeney, J., Robitzsch, S., et al.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. J. China Commun.13(7), 108–116 (2016)
Ouafi, K., Phan, R.C.W.: Privacy of recent RFID authentication protocols. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 263–277. Springer, Berlin Heidelberg (2008). doi:10.1007/978-3-540-79104-1_19
Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for K-barrier coverage based on integer linear programming. J. China Commun.13(7), 16–23 (2016)
Wang, B., Gu, X., Ma, L., et al.: Temperature error correction based on BP neural network in meteorological wireless sensor network. In: Sun, X., Liu, A., Chao, H.C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10040, pp. 117–132. Springer, Cham (2016). doi:10.1007/978-3-319-48674-1_11
Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. J. Secur. Commun. Netw.9(17), 4002–4012 (2016)
Acknowledgements
This work is supported by the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.
Author information
Authors and Affiliations
Engineering Research Center of Internet of Things Technology, Applications Ministry of Education, Jiangsu, 214122, China
Jing Li, Zhiping Zhou & Ping Wang
- Jing Li
You can also search for this author inPubMed Google Scholar
- Zhiping Zhou
You can also search for this author inPubMed Google Scholar
- Ping Wang
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toZhiping Zhou.
Editor information
Editors and Affiliations
Nanjing University of Information Science and Technology, Nanjing, China
Xingming Sun
National Dong Hwa University, Shoufeng, Taiwan
Han-Chieh Chao
China Information Technology Security Evaluation Center, Nanjing, China
Xingang You
Department of Computer Science, Purdue University, West Lafayette, Indiana, USA
Elisa Bertino
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Li, J., Zhou, Z., Wang, P. (2017). Server-Less Lightweight Authentication Protocol for RFID System. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_25
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-319-68541-0
Online ISBN:978-3-319-68542-7
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative