A New Scalable RFID Delegation Protocol

نویسندگان

  • Xiuqing Chen
  • Tianjie Cao
  • Yu Guo
چکیده

The radio frequency identification (RFID) protocols are vulnerable to various attacks from an active or passive adversary. We shed light upon some existing security flaws in these delegation protocols. It is useful to mitigate many security weaknesses in such delegation protocols to promote the acceptance of RFID tags. We propose that a scalable RFID delegation protocol will be against traceability attacks with a stateful variant so that it provides the claimed security requirements. Compared with the previous schemes, we emphasize three critical distinctions in our protocol. First, the reader and the tag decrease one bitwise XOR of the message and reduce the computational complexity. Second, a solution to reducing the maximum search complexity can be that add two different flags to the tags responses in order to distinguish delegation request from delegation update. Third, the number of exchanged flows during different cases of our revision is same. Finally, the proposed scheme achieves scalability and untraceability property without leading to a security collision.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation

RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...

متن کامل

A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags

RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate reading device (reader) collecting information about him. To solve these issues, many RFID privacy protecting protocols assume that readers have continuous connectivity with a centralised on-line database in charge of the i...

متن کامل

A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags

The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the tag attached to it, changes hands during the course of its lifetime. After such an ownership transfer, the new owner should be able to read the tag but the old owner should not. We address these issues through an RFID pse...

متن کامل

An Efficient Offline Delegation Protocol in Mobile RFID Environment

In this paper, we propose a new protocol to allow delegation transfer between offline mobile readers in the mobile RFID (Radio Frequency Identification) environment. A mobile reader can grant the access rights of a specific tag to another reader. Besides, our protocol is efficient and secure against most current network threats, such as replay attacks, Man-in-the-Middle (MITM) attacks, denial o...

متن کامل

An Efficient Delegation and Transfer of Ownership Protocol for RFID tags

RFID technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the possibility of collecting information about him. As RFID tags may often change hands, it is also necessary to guarantee the privacy of a new tag owner. In this paper, we introduce a new protocol based on pseudonyms that solves these privacy issues while enabling tag identification witho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014