A New Framework for Privacy of RFID Path Authentication

作者: Shaoying Cai , Robert H Deng , Yingjiu Li , Yunlei Zhao , None

DOI: 10.1007/978-3-642-31284-7_28

关键词:

摘要: RFID-based path authentication enables supply chain managers to verify the exact that a tag has taken. In this paper, we introduce new oracle Move models tag's movement along designed or an arbitrary in chain. With oracle, refine existing security and privacy notions for authentication. addition, propose notion, called privacy, Our notion captures of both identity information single game. Compared two-game based notions, it is more rigorous, powerful, concise. We also construct scheme. scheme does not require entities have any connection with each other except initial stage. It requires only 480 bits storage no computational ability on tag; thus can be deployed standard EPCglobal Class 1 Generation 2 tags market.

参考文章(16)
Shaoying Cai, Yingjiu Li, Yunlei Zhao, Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains information security conference. ,vol. 376, pp. 501- 512 ,(2012) , 10.1007/978-3-642-30436-1_41
Philippe Golle, Markus Jakobsson, Ari Juels, Paul Syverson, Universal Re-encryption for Mixnets the cryptographers’ track at the rsa conference. pp. 163- 178 ,(2004) , 10.1007/978-3-540-24660-2_14
Andrew C. Yao, Moti Yung, Yunlei Zhao, Adaptive Concurrent Non-Malleability with Bare Public-Keys arXiv: Computational Complexity. ,(2009)
Erik-Oliver Blass, Tracker : security and privacy for RFID-based supply chains network and distributed system security symposium. ,(2011)
Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Attacks and improvements to an RIFD mutual authentication protocol and its extensions Proceedings of the second ACM conference on Wireless network security - WiSec '09. pp. 51- 58 ,(2009) , 10.1145/1514274.1514282
Boyeon Song, Chris J. Mitchell, RFID authentication protocol for low-cost tags wireless network security. pp. 140- 147 ,(2008) , 10.1145/1352533.1352556
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M.E. Tapiador, Tieyan Li, Yingjiu Li, Vulnerability analysis of RFID protocols for tag ownership transfer Computer Networks. ,vol. 54, pp. 1502- 1508 ,(2010) , 10.1016/J.COMNET.2009.11.007
Yingjiu Li, Xuhua Ding, Protecting RFID communications in supply chains Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 234- 241 ,(2007) , 10.1145/1229285.1229318
Gregory J. Walters, Privacy and security ACM SIGCAS Computers and Society. ,vol. 31, pp. 8- 23 ,(2001) , 10.1145/503345.503347
Panagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis, Security analysis of the song-mitchell authentication protocol for low-cost RFID tags IEEE Communications Letters. ,vol. 13, pp. 274- 276 ,(2009) , 10.1109/LCOMM.2009.082117