On The Performance Bound of Structured Key-Based RFID Authentication

作者: Kazuya Sakai , Min-Te Sun , Wei-Shinn Ku , Ten H. Lai

DOI: 10.1109/PERCOM.2019.8767391

关键词:

摘要: Designing fast and secure RFID private authentication with structured key management is one of the most essential components for RFID-enabled large-scale object management. Since group keys are shared by some tags in key-based authentication, physical tampering tags, so called compromise attack, may enable adversary to obtain stored compromised which turn can be used distinguish other tags. All existing protocols try reduce common effect preserve high privacy. However, theoretical bound weak privacy achievable remains unknown. In this paper, we investigate authentication. To end, first formulate a mathematical model identifies probability two being linked respect number keys. Our shows that solutions far from ultimate goal Then, propose k-neighbor graph-based (KNGA) protocol, where random walk over graph performed. addition, show KNGA achieves performance bound, then quantify degree anonymity. Finally, extensive simulations demonstrate proposed protocol successfully its design goals.

参考文章(20)
Peter Mameli, Adina Schwartz, John Kleinig, Seumas Miller, Douglas Salane, Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States ,(2012)
Ari Juels, Minimalist Cryptography for Low-Cost RFID Tags. security and cryptography for networks. pp. 149- 164 ,(2004)
Yehuda Lindell, Jonathan Katz, Introduction to Modern Cryptography ,(2007)
Tao Li, Wen Luo, Zhen Mo, Shigang Chen, Privacy-preserving RFID authentication based on cryptographical encoding international conference on computer communications. pp. 2174- 2182 ,(2012) , 10.1109/INFCOM.2012.6195601
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. Ni, Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems ieee international conference on pervasive computing and communications. pp. 13- 22 ,(2007) , 10.1109/PERCOM.2007.13
Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma, On two RFID privacy notions and their relations ACM Transactions on Information and System Security. ,vol. 14, pp. 1- 23 ,(2011) , 10.1145/2043628.2043631
Gregory J. Walters, Privacy and security ACM SIGCAS Computers and Society. ,vol. 31, pp. 8- 23 ,(2001) , 10.1145/503345.503347
Basel Alomair, Andrew Clark, Jorge Cuellar, Radha Poovendran, Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification IEEE Transactions on Parallel and Distributed Systems. ,vol. 23, pp. 1536- 1550 ,(2012) , 10.1109/TPDS.2011.290
Gildas Avoine, Levente Buttyant, Tamas Holczer, Istvan Vajda, Group-Based Private Authentication world of wireless mobile and multimedia networks. pp. 1- 6 ,(2007) , 10.1109/WOWMOM.2007.4351808
Stephen August Weis, Security and Privacy in Radio-Frequency Identification Devices Massachusetts Institute of Technology. ,(2003)