Untraceable and Serverless RFID Authentication and Search Protocols
Citations Over TimeTop 10% of 2011 papers
Abstract
So far, conventional RFID protocols provide the security and privacy protections by utilizing the central database model where readers should maintain the persistent connection between the readers and the central database. Recently, severless RFID protocols [4], [5] have been proposed to provide more flexible RFID service by removing the need of this connection. In this paper, we first point out the tracing vulnerability of the existing serverless RFID protocols. To address this vulnerability, we suggest a novel method which generates a unique access list for each reader based on groups of tags and multiple pseudonyms. We then propose untraceable and serverless RFID authentication and search protocols with this method. In comparison with [4], our protocols provide more resilient protection to the tracing vulnerability. Moreover, our protocols show less computation overhead than [4].
Related Papers
- → SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity(2007)489 cited
- → Authentication for distributed systems(1992)197 cited
- → A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community(2020)32 cited
- → Definition of entity authentication(2010)9 cited
- → Research of AAA messages Based on 802.1x authentication(2015)6 cited