Privacy-Preserving authorized RFID authentication protocols

Nan Li*, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

9 Citations (Scopus)


Radio Frequency Identification (RFID) has been widely ad-opted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by different parties. Although the private information should not be shared, the system should allow a valid tag to be authenticated by a legal reader. The challenge in designing the system is preserving the tag and reader’s privacy. In this paper, we propose a novel concept of authorized RFID authentication. The proposed protocols allow the tag to be merely identifiable by an authorized reader and the server cannot reveal the tag during the reader-server interaction. We provide a formal definition of privacy and security models of authorized authentication protocols under the strong and weak notions and propose three provably secure protocols.

Original languageEnglish
Title of host publicationRadio Frequency Identification: Security and Privacy Issues
Subtitle of host publication10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
EditorsNitesh Saxena, Ahmad-Reza Sadeghi
Place of PublicationSwitzerland
PublisherSpringer, Springer Nature
Number of pages15
ISBN (Electronic)9783319130668
ISBN (Print)9783319130651
Publication statusPublished - 2014
EventInternational Workshop, RFIDSec (10th : 2014) - Oxford, United Kingdom
Duration: 21 Jul 201423 Jul 2014

Publication series

NameLecture Notes in Computer Science
PublisherSpringer International Publishing
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


WorkshopInternational Workshop, RFIDSec (10th : 2014)
CountryUnited Kingdom

Fingerprint Dive into the research topics of 'Privacy-Preserving authorized RFID authentication protocols'. Together they form a unique fingerprint.

Cite this