{"title":"保护RFID标签:完整性、可靠性和不可追溯性的认证协议","authors":"Huafei Zhu, F. Bao","doi":"10.1109/WCNC.2007.501","DOIUrl":null,"url":null,"abstract":"Although radio frequency identification (RFID) technology is promising, it is vulnerable and subject to a wide range of attacks due to possible tags compromise, difficulty in physical protection, absence of infrastructure and so on. Generally speaking, the threat to RFID systems mainly comes from the illegal reader's attempt to compromise tag identity. In order to protect the tag carries' privacy (intuitively, privacy for RFID tags means that the communication of a tag does not allow an adversary to determine the identity of the tag (non-traceability), however the reader should be able to determine whether the tag it reads is valid (completeness) and only such tags (soundness)), a security model that supports the analytical argument of properties, addressing both security and performance issues for RFID tags is introduced and formalized in this paper. The significant feature of our model is that a back-end database for a reader is explicitly introduced which allows the reader to search key-index set used by individual tags more efficiently, and describe the protocols in a unique way, where properties can be isolated and analyzed. We then propose an authentication protocol for securing RFID tags, and show that our implementation is completeness, soundness and non-traceability in the independent random oracle model.","PeriodicalId":292621,"journal":{"name":"2007 IEEE Wireless Communications and Networking Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability\",\"authors\":\"Huafei Zhu, F. Bao\",\"doi\":\"10.1109/WCNC.2007.501\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although radio frequency identification (RFID) technology is promising, it is vulnerable and subject to a wide range of attacks due to possible tags compromise, difficulty in physical protection, absence of infrastructure and so on. Generally speaking, the threat to RFID systems mainly comes from the illegal reader's attempt to compromise tag identity. In order to protect the tag carries' privacy (intuitively, privacy for RFID tags means that the communication of a tag does not allow an adversary to determine the identity of the tag (non-traceability), however the reader should be able to determine whether the tag it reads is valid (completeness) and only such tags (soundness)), a security model that supports the analytical argument of properties, addressing both security and performance issues for RFID tags is introduced and formalized in this paper. The significant feature of our model is that a back-end database for a reader is explicitly introduced which allows the reader to search key-index set used by individual tags more efficiently, and describe the protocols in a unique way, where properties can be isolated and analyzed. We then propose an authentication protocol for securing RFID tags, and show that our implementation is completeness, soundness and non-traceability in the independent random oracle model.\",\"PeriodicalId\":292621,\"journal\":{\"name\":\"2007 IEEE Wireless Communications and Networking Conference\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE Wireless Communications and Networking Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCNC.2007.501\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Wireless Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNC.2007.501","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability
Although radio frequency identification (RFID) technology is promising, it is vulnerable and subject to a wide range of attacks due to possible tags compromise, difficulty in physical protection, absence of infrastructure and so on. Generally speaking, the threat to RFID systems mainly comes from the illegal reader's attempt to compromise tag identity. In order to protect the tag carries' privacy (intuitively, privacy for RFID tags means that the communication of a tag does not allow an adversary to determine the identity of the tag (non-traceability), however the reader should be able to determine whether the tag it reads is valid (completeness) and only such tags (soundness)), a security model that supports the analytical argument of properties, addressing both security and performance issues for RFID tags is introduced and formalized in this paper. The significant feature of our model is that a back-end database for a reader is explicitly introduced which allows the reader to search key-index set used by individual tags more efficiently, and describe the protocols in a unique way, where properties can be isolated and analyzed. We then propose an authentication protocol for securing RFID tags, and show that our implementation is completeness, soundness and non-traceability in the independent random oracle model.