保护RFID标签:完整性、可靠性和不可追溯性的认证协议

Huafei Zhu, F. Bao
{"title":"保护RFID标签:完整性、可靠性和不可追溯性的认证协议","authors":"Huafei Zhu, F. Bao","doi":"10.1109/WCNC.2007.501","DOIUrl":null,"url":null,"abstract":"Although radio frequency identification (RFID) technology is promising, it is vulnerable and subject to a wide range of attacks due to possible tags compromise, difficulty in physical protection, absence of infrastructure and so on. Generally speaking, the threat to RFID systems mainly comes from the illegal reader's attempt to compromise tag identity. In order to protect the tag carries' privacy (intuitively, privacy for RFID tags means that the communication of a tag does not allow an adversary to determine the identity of the tag (non-traceability), however the reader should be able to determine whether the tag it reads is valid (completeness) and only such tags (soundness)), a security model that supports the analytical argument of properties, addressing both security and performance issues for RFID tags is introduced and formalized in this paper. The significant feature of our model is that a back-end database for a reader is explicitly introduced which allows the reader to search key-index set used by individual tags more efficiently, and describe the protocols in a unique way, where properties can be isolated and analyzed. We then propose an authentication protocol for securing RFID tags, and show that our implementation is completeness, soundness and non-traceability in the independent random oracle model.","PeriodicalId":292621,"journal":{"name":"2007 IEEE Wireless Communications and Networking Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability\",\"authors\":\"Huafei Zhu, F. Bao\",\"doi\":\"10.1109/WCNC.2007.501\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although radio frequency identification (RFID) technology is promising, it is vulnerable and subject to a wide range of attacks due to possible tags compromise, difficulty in physical protection, absence of infrastructure and so on. Generally speaking, the threat to RFID systems mainly comes from the illegal reader's attempt to compromise tag identity. In order to protect the tag carries' privacy (intuitively, privacy for RFID tags means that the communication of a tag does not allow an adversary to determine the identity of the tag (non-traceability), however the reader should be able to determine whether the tag it reads is valid (completeness) and only such tags (soundness)), a security model that supports the analytical argument of properties, addressing both security and performance issues for RFID tags is introduced and formalized in this paper. The significant feature of our model is that a back-end database for a reader is explicitly introduced which allows the reader to search key-index set used by individual tags more efficiently, and describe the protocols in a unique way, where properties can be isolated and analyzed. We then propose an authentication protocol for securing RFID tags, and show that our implementation is completeness, soundness and non-traceability in the independent random oracle model.\",\"PeriodicalId\":292621,\"journal\":{\"name\":\"2007 IEEE Wireless Communications and Networking Conference\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE Wireless Communications and Networking Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCNC.2007.501\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Wireless Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNC.2007.501","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

尽管射频识别(RFID)技术很有前途,但由于标签可能被破坏、物理保护困难、缺乏基础设施等原因,它很脆弱,容易受到广泛的攻击。一般来说,对RFID系统的威胁主要来自于非法阅读器试图破坏标签身份。为了保护标签携带的隐私(直观地说,RFID标签的隐私意味着标签的通信不允许对手确定标签的身份(不可追溯性),但是阅读器应该能够确定它所读取的标签是否有效(完整性),并且只有这样的标签(稳健性)),支持属性分析论证的安全模型。本文介绍并形式化了RFID标签的安全性和性能问题。我们的模型的重要特征是明确地引入了阅读器的后端数据库,它允许阅读器更有效地搜索单个标签使用的键-索引集,并以独特的方式描述协议,其中属性可以被隔离和分析。然后,我们提出了一种用于保护RFID标签的认证协议,并证明了我们的实现在独立随机oracle模型中是完整的、健全的和不可追溯的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability
Although radio frequency identification (RFID) technology is promising, it is vulnerable and subject to a wide range of attacks due to possible tags compromise, difficulty in physical protection, absence of infrastructure and so on. Generally speaking, the threat to RFID systems mainly comes from the illegal reader's attempt to compromise tag identity. In order to protect the tag carries' privacy (intuitively, privacy for RFID tags means that the communication of a tag does not allow an adversary to determine the identity of the tag (non-traceability), however the reader should be able to determine whether the tag it reads is valid (completeness) and only such tags (soundness)), a security model that supports the analytical argument of properties, addressing both security and performance issues for RFID tags is introduced and formalized in this paper. The significant feature of our model is that a back-end database for a reader is explicitly introduced which allows the reader to search key-index set used by individual tags more efficiently, and describe the protocols in a unique way, where properties can be isolated and analyzed. We then propose an authentication protocol for securing RFID tags, and show that our implementation is completeness, soundness and non-traceability in the independent random oracle model.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信