Abstract
Radio Frequency IDentification (RFID) systems are gaining enormous interests in industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more important concern in the RFID system because of pervasiveness of RFID tags. Over the years, many protocols have been proposed for RFID tags’ identification using symmetric key cryptography and other primitives. Many of them have failed to preserve tags’ privacy. In order to achieve privacy and to provide scalability and anti-cloning features of RFID system, public-key primitives should be used in an RFID authentication protocol [1]. In this paper, we present a mutual authentication protocol for RFID systems using elliptic curves arithmetic. The proposed protocol provides narrow-strong and wide-weak privacy under standard complexity assumption.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Burmester, M., Medeiros, B., Motta, R.: Robust Anonymous RFID Authentication with Constant Key Lookup. In: Proc. of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pp. 283–291 (2008)
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)
Lee, Y.K., Batina, L., Singelee, D., Verbauwhede, I.: Low-cost Untraceable Authentication Protocols for RFID (extended version). In: Proc. of the ACM Conference on Wireless Network Security (WiSec 2010), pp. 55–64 (2010)
Avoine, G.: Adversarial Model for Radio Frequency Identification. IACR Cryptology ePrint Archive, Report no.49 (2005)
Juels, A., Weis, S.: Defining Strong Privacy for RFID. IACR Cryptology ePrint Archive, Report no.137 (2006)
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID Privacy Models Revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251–266. Springer, Heidelberg (2008)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004)
Lee, Y.K., Batina, L., Verbauwhede, I.: Untraceable RFID Authentication Protocols: Revision of EC-RAC. In: Proc. of the IEEE International Conference on RFID, pp. 178–185 (2009)
Wolkerstorfer, J.: Is Elliptic-curve Cryptography Suitable to Secure RFID Tags? In: Proc. of the Workshop on RFID and Light-weight Cryptography (2005)
Tuyls, P., Batina, L.: RFID-tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key Cryptography for RFID-tags. In: Proc. of the IEEE International Workshop on Pervasive Computing and Communication Security, Persec 2007 (2007)
Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic Curve based Security Processor for RFID. IEEE Transactions on Computer 57(11), 1514–1527 (2008)
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31–53. Springer, Heidelberg (1993)
Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID – A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 401–413. Springer, Heidelberg (2009)
Oren, Y., Feldhofer, M.: A Low-resource Public-key Identification Scheme for RFID Tags and Sensor Nodes. In: Proc. of the ACM Conference on Wireless Network Security, pp. 59–68 (2009)
Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149–161. Springer, Heidelberg (2008)
Deursen, T., Radomirovic, S.: Attacks on RFID Protocols. IACR Cryptology ePrint Archive, Report no.310 (2008)
van Deursen, T., Radomirović, S.: EC-RAC: Enriching a Capacious RFID Attack Collection. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 75–90. Springer, Heidelberg (2010)
Fan, J., Hermans, J., Vercauteren, F.: On the Claimed Privacy of EC-RAC III. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 66–74. Springer, Heidelberg (2010)
Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)
Deursen, T., Radomirovic, S.: Untraceable RFID Protocols are not Trivially Composable: Attacks on the Revision of EC-RAC. IACR Cryptology ePrint Archive, Report no.332 (2009)
ISO/IEC 14443-4:2008(E), Identification cards – Contactless integrated circuit cards – Proximity cards – Part 4: Transmission protocol, https://www.iso.org/obp/ui/#iso:std:iso-iec:14443:-4:ed-2:v1:en (retrieved September 2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Songhela, R., Das, M.L. (2014). Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2014. Lecture Notes in Computer Science, vol 8804. Springer, Cham. https://doi.org/10.1007/978-3-319-12060-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-12060-7_12
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12059-1
Online ISBN: 978-3-319-12060-7
eBook Packages: Computer ScienceComputer Science (R0)