Untraceable Analysis of Scalable RFID Security Protocols
- 34 Downloads
In order to support robust implementation of IoT, many schemes have been done to provide privacy, anonymity, scalability and customizability. Ray et al.’s scheme and Mir et al.’s protocol are analyzed in this paper and suffer from tracing attacks. Ray et al.’s scheme is subjected to malicious impersonation attacks, and does not achieve strong forward untraceability. Then the improved protocol is proposed, which adapts quadratic residue theorem to offer better security, scalability and customizability. Finally, the improved protocol meets forward untraceability, backward untraceability and strong forward untraceability under the untraceability model, and resists reader impersonation attacks, tag impersonation attacks, and tracing attacks. The comparison results show that the improved protocol offers better security and scalability than the existing protocols.
KeywordsRFID Scalability Tracing attacks Forward untraceability Backward untraceability Strong forward untraceability
The authors would like to thank the anonymous referee for their valuable discussions and comments. This research was partially supported by Jiangsu Postdoctoral Science Foundation (Grant Nos. 1701061B, 2017107007); Xuzhou Medical University Affiliated Hospital Postdoctoral Science Foundation (Grant Nos. 2016107011, 183822, 53120225, 53120226); Xuzhou Medical University Excellent Persons Scientific Research Foundation (Grant Nos. D2016006, D2016007, 53591506); Practice Inovation Trainng Program Projects for Jiangsu College Students (Grant Nos. 20161031308H, 201610313043Y); Natural Science Foundation of the Jiangsu Higher Education Institutions of China (Grant No. 16KJB180028); Innovation Project of JiangSu Province (Grant No. 2012); Educational Commission of Jiangsu Province of China (Grant No. 2015JSJJG261); 333 Project of Jiangsu Province (Grant No. BRA2017278).
Compliance with Ethical Standards
Conflict of interest
The authors declare no conflict of interest.
- 2.Omar, H. Q., Khoshnaw, A., & Monnet, W. (2017). Smart patient management, monitoring and tracking system using radio-frequency identification (RFID) technology. In Biomedical engineering and sciences. IEEE.Google Scholar
- 3.Dusart, P., & Traoré, S. (2013). Lightweight authentication protocol for low-cost RFID tags. In L. Cavallaro & D. Gollmann (Eds.), WISTP 2013, LNCS (Vol. 7886, pp. 129–144). Heidelberg: Springer.Google Scholar
- 10.Sundaresan, S., Doss, R., & Zhou, W. (2012). A secure search protocol based on quadratic residues for EPC Class-1 Gen-2 UHF RFID tags (Vol. 2012, pp. 30–35).Google Scholar
- 15.Xie, W., Xie, L., Zhang, C., Zhang, Q., & Tang, C. J. (2013). Cloud-based RFID authentication. In Proceedings of IEEE international conference on RFID, Apr 30–May 02, Orlando, FenLan, 2013 (pp. 168–175).Google Scholar
- 18.Shen, J., Tan, H., Moh, S., et al. (2016). An efficient RFID authentication protocol providing strong privacy and security. Journal of Internet Technology,17, 443–455.Google Scholar
- 24.Trujillo-Rasua, R., & Solanas, A. (2011). Scalable trajectory-based protocol for RFID tags identification. In Proceedings of the 2011 IEEE international conference on RFID-technologies and applications (RFID-TA) (pp. 279–285). IEEE.Google Scholar
- 28.Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security (pp. 210–219). New York: ACM.Google Scholar