University of Wollongong
Browse

Privacy-preserving authorised RFID authentication protocols

Download (402.39 kB)
conference contribution
posted on 2024-11-14, 09:20 authored by Nan LiNan Li, Yi Mu, Willy SusiloWilly Susilo, Fuchun GuoFuchun Guo, Vijay Varadharajan
Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by different parties. Although the private information should not be shared, the system should allow a valid tag to be authenticated by a legal reader. The challenge in designing the system is preserving the tag and reader's privacy. In this paper, we propose a novel concept of authorized RFID authentication. The proposed protocols allow the tag to be merely identifiable by an authorized reader and the server cannot reveal the tag during the reader-server interaction. We provide a formal definition of privacy and security models of authorized authentication protocols under the strong and weak notions and propose three provably secure protocols

History

Citation

LI, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2014). Privacy-preserving authorised RFID authentication protocols. In N. Saxena & A. Sadeghi (Eds.), 10th International Workshop, RFIDSec 2014 (pp. 108-122). Switzerland: Springer International Publishing.

Parent title

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Volume

8651

Pagination

108-122

Language

English

RIS ID

90725

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC