TY - GEN
T1 - Privacy-Preserving authorized RFID authentication protocols
AU - Li, Nan
AU - Mu, Yi
AU - Susilo, Willy
AU - Guo, Fuchun
AU - Varadharajan, Vijay
PY - 2014
Y1 - 2014
N2 - Radio Frequency Identification (RFID) has been widely ad-opted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by different parties. Although the private information should not be shared, the system should allow a valid tag to be authenticated by a legal reader. The challenge in designing the system is preserving the tag and reader’s privacy. In this paper, we propose a novel concept of authorized RFID authentication. The proposed protocols allow the tag to be merely identifiable by an authorized reader and the server cannot reveal the tag during the reader-server interaction. We provide a formal definition of privacy and security models of authorized authentication protocols under the strong and weak notions and propose three provably secure protocols.
AB - Radio Frequency Identification (RFID) has been widely ad-opted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by different parties. Although the private information should not be shared, the system should allow a valid tag to be authenticated by a legal reader. The challenge in designing the system is preserving the tag and reader’s privacy. In this paper, we propose a novel concept of authorized RFID authentication. The proposed protocols allow the tag to be merely identifiable by an authorized reader and the server cannot reveal the tag during the reader-server interaction. We provide a formal definition of privacy and security models of authorized authentication protocols under the strong and weak notions and propose three provably secure protocols.
UR - http://www.scopus.com/inward/record.url?scp=84911941625&partnerID=8YFLogxK
UR - http://purl.org/au-research/grants/arc/DP110101951
U2 - 10.1007/978-3-319-13066-8_7
DO - 10.1007/978-3-319-13066-8_7
M3 - Conference proceeding contribution
AN - SCOPUS:84911941625
SN - 9783319130651
VL - 8651
T3 - Lecture Notes in Computer Science
SP - 108
EP - 122
BT - Radio Frequency Identification: Security and Privacy Issues
A2 - Saxena, Nitesh
A2 - Sadeghi, Ahmad-Reza
PB - Springer, Springer Nature
CY - Switzerland
T2 - International Workshop, RFIDSec (10th : 2014)
Y2 - 21 July 2014 through 23 July 2014
ER -