Cyclic group based mutual authentication protocol for RFID system

12/31/2017
by   Pramod Kumar Maurya, et al.
0

Widespread deployment of RFID system arises security and privacy concerns of users. There are several proposals are in the literature to avoid these concerns, but most of them provides reasonable privacy at the cost of search complexity on the server side. The search complexity increases linearly with the number of tags in the system. Some schemes use a group based approach to solve the search complexity problem. In this paper, we proposed a group based authentication protocol for RFID system which is based on some characteristics of cyclic groups. The scheme uses only bitwise XOR and mod operation for the computational work. Also, the scheme does not use any pseudo-number generator on the tag-side. We use two benchmark metric based on anonymity set to measure the privacy level of the system when some tags are compromised by an adversary. We present some simulation results which show that the scheme preserves high level of privacy and discloses very less amount of information when some tags are compromised. Furthermore, it's formal and informal analysis shows that our scheme preserves information privacy as well as un-traceability and also withstand against various well known attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/15/2021

Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case

Today, the Internet of Things (IoT) is one of the emerging technologies ...
research
10/19/2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

Radio Frequency Identification (RFID) is a key technology used in many a...
research
10/13/2021

Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System

The usage of different technologies and smart devices helps people to ge...
research
08/06/2022

RFID authentication protocol based on a novel EPC Gen2 PRNG

Continuous advances of Information Technologies (ITs), and in particular...
research
03/07/2022

Complexity of Conjugacy Search in some Polycyclic and Matrix Groups

The most prominent algorithmic problem employed in the recently emerging...
research
11/30/2020

A Critique of Immunity Passports and W3C Decentralized Identifiers

Due to the widespread COVID-19 pandemic, there has been a push for `immu...
research
12/28/2019

Schemes for Privacy Data Destruction in a NAND Flash Memory

We propose schemes for efficiently destroying privacy data in a NAND fla...

Please sign up or login with your details

Forgot password? Click here to reset