Hierarchical ECC-Based RFID authentication protocol

作者: Lejla Batina , Stefaan Seys , Dave Singelée , Ingrid Verbauwhede

DOI: 10.1007/978-3-642-25286-0_12

关键词:

摘要: RFID (Radio Frequency Identification) technology enables readers to scan remote tags, and label the objects people which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments often not compatible, or reveal too much information readers. To tackle this problem, we introduce concept of groups propose a hierarchical protocol. By using protocol, an tag can tune its identification process type reader it is communicating with. Only subset learn identity particular tag, while others only acquire on group belongs. Our protocol offers impersonation resistance narrow-strong privacy-preserving. Furthermore, extend multiple level subgroups, demonstrate feasibility our proposed for tags.

参考文章(41)
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm Lecture Notes in Computer Science. pp. 357- 370 ,(2004) , 10.1007/978-3-540-28632-5_26
Junfeng Fan, Jens Hermans, Frederik Vercauteren, On the claimed privacy of EC-RAC III radio frequency identification security and privacy issues. pp. 66- 74 ,(2010) , 10.1007/978-3-642-16822-2_7
Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon, Code-Carrying Authorization european symposium on research in computer security. ,vol. 5283, pp. 563- 579 ,(2008) , 10.1007/978-3-540-88313-5_36
Julien Bringer, Hervé Chabanne, Thomas Icart, Cryptanalysis of EC-RAC, a RFID Identification Protocol cryptology and network security. pp. 149- 161 ,(2008) , 10.1007/978-3-540-89641-8_11
Ton van Deursen, Saša Radomirović, EC-RAC: enriching a capacious RFID attack collection radio frequency identification security and privacy issues. pp. 75- 90 ,(2010) , 10.1007/978-3-642-16822-2_8
Radio Frequency Identification: Security and Privacy Issues Lecture Notes in Computer Science. ,vol. 6370, ,(2010) , 10.1007/978-3-642-16822-2
Jan Camenisch, Anna Lysyanskaya, Signature Schemes and Anonymous Credentials from Bilinear Maps Advances in Cryptology – CRYPTO 2004. pp. 56- 72 ,(2004) , 10.1007/978-3-540-28628-8_4
Ari Juels, Stephen A. Weis, Defining Strong Privacy for RFID pervasive computing and communications. pp. 342- 347 ,(2007) , 10.1109/PERCOMW.2007.37