Abstract
Private RFID authentication with structured key management securely singulates RF tags in the logarithmic order by having group keys shared by several tags. However, the degree of tags’ privacy will decrease should some tags in the system be compromised by correlating tampered group keys. Improving the degree of tags’ privacy in keeping with fast authentication speed is equivalent to reducing the correlation probability of group keys. To this end, we propose Randomized Skip Graphs-Based Authentication (RSGA) that significantly improves the tags’ privacy in terms of anonymity with reasonable amount of key storage cost. The simulation results demonstrate that the proposed scheme achieves it design goals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aspnes, J., Shah, G.: Skip graphs. ACM Trans. Algorithms 3(4), 37 (2007)
Chen, M., Chen, S.: ETAP: Enable Lightweight Anonymous RFID authentication with O(1) overhead. In: ICNP, pp. 267–278 (2015)
Hoque, M.E., Rahman, F., Ahamed, S.I.: AnonPri: an efficient anonymous private authentication protocol. In: PerCom, pp. 102–110 (2011)
Li, Y., Deng, R.H., Lai, J., Ma, C.: On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4), 30 (2011)
Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M., Key-Updating, D.: Privacy-preserving authentication for RFID systems. In: PerCom, pp. 13–22 (2007)
Lu, L., Han, J., Xiao, R., Liu, Y.: ACTION: breaking the privacy barrier for RFID systems. In: Infocom, pp. 1951–1961 (2009)
Molnar, D., Wagner, D.: Privacy and security in library RFID Issues, practices, and architectures. In: CCS, pp. 210–219 (2004)
Sun, M.-T., Sakai, K., Ku, W.-S., Lai, T.H., Vasilakos, A.V.: Private and secure tag access for large-scale RFID systems. IEEE Trans. Dependable Secur. Compt. (in press)
Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. Master Thesis, MIT (2003)
Yao, Q., Qi, Q., Han, J., Zhao, J., Li, X., Liu, Y.: Randomized RFID private authentication. In: PerCom, pp. 1–10 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Komori, Y., Sakai, K., Fukumoto, S. (2016). Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems. In: Yang, Q., Yu, W., Challal, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2016. Lecture Notes in Computer Science(), vol 9798. Springer, Cham. https://doi.org/10.1007/978-3-319-42836-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-42836-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42835-2
Online ISBN: 978-3-319-42836-9
eBook Packages: Computer ScienceComputer Science (R0)