Skip to main content

Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol

  • Conference paper
Security, Privacy, and Applied Cryptography Engineering (SPACE 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8804))

Abstract

Radio Frequency IDentification (RFID) systems are gaining enormous interests in industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more important concern in the RFID system because of pervasiveness of RFID tags. Over the years, many protocols have been proposed for RFID tags’ identification using symmetric key cryptography and other primitives. Many of them have failed to preserve tags’ privacy. In order to achieve privacy and to provide scalability and anti-cloning features of RFID system, public-key primitives should be used in an RFID authentication protocol [1]. In this paper, we present a mutual authentication protocol for RFID systems using elliptic curves arithmetic. The proposed protocol provides narrow-strong and wide-weak privacy under standard complexity assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burmester, M., Medeiros, B., Motta, R.: Robust Anonymous RFID Authentication with Constant Key Lookup. In: Proc. of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pp. 283–291 (2008)

    Google Scholar 

  2. Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Lee, Y.K., Batina, L., Singelee, D., Verbauwhede, I.: Low-cost Untraceable Authentication Protocols for RFID (extended version). In: Proc. of the ACM Conference on Wireless Network Security (WiSec 2010), pp. 55–64 (2010)

    Google Scholar 

  4. Avoine, G.: Adversarial Model for Radio Frequency Identification. IACR Cryptology ePrint Archive, Report no.49 (2005)

    Google Scholar 

  5. Juels, A., Weis, S.: Defining Strong Privacy for RFID. IACR Cryptology ePrint Archive, Report no.137 (2006)

    Google Scholar 

  6. Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID Privacy Models Revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251–266. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004)

    Google Scholar 

  8. Lee, Y.K., Batina, L., Verbauwhede, I.: Untraceable RFID Authentication Protocols: Revision of EC-RAC. In: Proc. of the IEEE International Conference on RFID, pp. 178–185 (2009)

    Google Scholar 

  9. Wolkerstorfer, J.: Is Elliptic-curve Cryptography Suitable to Secure RFID Tags? In: Proc. of the Workshop on RFID and Light-weight Cryptography (2005)

    Google Scholar 

  10. Tuyls, P., Batina, L.: RFID-tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key Cryptography for RFID-tags. In: Proc. of the IEEE International Workshop on Pervasive Computing and Communication Security, Persec 2007 (2007)

    Google Scholar 

  12. Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic Curve based Security Processor for RFID. IEEE Transactions on Computer 57(11), 1514–1527 (2008)

    Article  MathSciNet  Google Scholar 

  13. Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31–53. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  14. Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID – A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 401–413. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Oren, Y., Feldhofer, M.: A Low-resource Public-key Identification Scheme for RFID Tags and Sensor Nodes. In: Proc. of the ACM Conference on Wireless Network Security, pp. 59–68 (2009)

    Google Scholar 

  16. Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149–161. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  17. Deursen, T., Radomirovic, S.: Attacks on RFID Protocols. IACR Cryptology ePrint Archive, Report no.310 (2008)

    Google Scholar 

  18. van Deursen, T., Radomirović, S.: EC-RAC: Enriching a Capacious RFID Attack Collection. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 75–90. Springer, Heidelberg (2010)

    Google Scholar 

  19. Fan, J., Hermans, J., Vercauteren, F.: On the Claimed Privacy of EC-RAC III. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 66–74. Springer, Heidelberg (2010)

    Google Scholar 

  20. Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)

    Google Scholar 

  21. Deursen, T., Radomirovic, S.: Untraceable RFID Protocols are not Trivially Composable: Attacks on the Revision of EC-RAC. IACR Cryptology ePrint Archive, Report no.332 (2009)

    Google Scholar 

  22. ISO/IEC 14443-4:2008(E), Identification cards – Contactless integrated circuit cards – Proximity cards – Part 4: Transmission protocol, https://www.iso.org/obp/ui/#iso:std:iso-iec:14443:-4:ed-2:v1:en (retrieved September 2013)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Songhela, R., Das, M.L. (2014). Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2014. Lecture Notes in Computer Science, vol 8804. Springer, Cham. https://doi.org/10.1007/978-3-319-12060-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12060-7_12

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12059-1

  • Online ISBN: 978-3-319-12060-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics