scispace - formally typeset
Journal ArticleDOI

Secure and Serverless RFID Authentication and Search Protocols

Reads0
Chats0
TLDR
A more flexible authentication protocol that provides comparable protection without the need for a central database is proposed and a protocol for secure search for RFID tags is suggested.
Abstract
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we propose a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to securely search for RFID tags will be increasingly useful.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Counting RFID Tags Efficiently and Anonymously

TL;DR: This paper presents an efficient and anonymous scheme for tag population estimation that leverages the position of the first reply from a group of tags in a frame and outperforms other protocols proposed in the previous work.
Journal ArticleDOI

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions

TL;DR: This paper proposes a lightweight privacy-preserving authentication protocol for the RFID system by considering the ideal PUF environment, and introduces an enhanced protocol which can support the noisyPUF environment.
Journal ArticleDOI

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.
Journal ArticleDOI

rfid in pervasive computing: State-of-the-art and outlook

TL;DR: This survey considers developments towards establishing rfid as the cost-effective technical solution for the development of open, shared, universal pervasive computing infrastructures and looks ahead to its future.
Journal ArticleDOI

Fast tag searching protocol for large-scale RFID systems

TL;DR: The results demonstrate that the proposed tag searching protocol is highly efficient in terms of both time efficiency and transmission overhead, leading to good applicability and scalability for large-scale RFID systems.
References
More filters
Journal ArticleDOI

RFID security and privacy: a research survey

TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Book ChapterDOI

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Book ChapterDOI

Authenticating pervasive devices with human protocols

TL;DR: This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Proceedings ArticleDOI

Privacy and security in library RFID: issues, practices, and architectures

TL;DR: Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.

Cryptographic Approach to “Privacy-Friendly” Tags

TL;DR: This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.
Related Papers (5)