Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

10/19/2022
by   Shaoying Cai, et al.
0

Radio Frequency Identification (RFID) is a key technology used in many applications. In the past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication protocols as well as formal frameworks for evaluating them have been proposed. However, we notice that a property, namely proof of possession (PoP), has not been rigorously studied till now, despite it has significant value in many RFID applications. For example, in RFID-enabled supply chains, PoP helps prevent dis-honest parties from publishing information about products/tags that they actually have never processed. We propose the first formal framework for RFID tag/mutual authentication with PoP after correcting deficiencies of some existing RFID formal frameworks. We provide a generic construction to transform an RFID tag/mutual authentication protocol to one that supports PoP using a cryptographic hash function, a pseudorandom function (PRF) and a signature scheme. We prove that the constructed protocol is secure and privacy-preserving under our framework if all the building blocks possess desired security properties. Finally, we show an RFID mutual authentication protocol with PoP. Arming tag/mutual authentication protocols with PoP is an important step to strengthen RFID-enabled systems as it bridges the security gap between physical layer and data layer, and reduces the misuses of RFID-related data.

READ FULL TEXT
research
07/25/2019

Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT

By expanding the connection of objects to the Internet and their entry t...
research
02/02/2019

Data Exfiltration via Multipurpose RFID Cards and Countermeasures

Radio-frequency identification(RFID) technology is widely applied in dai...
research
12/31/2017

Cyclic group based mutual authentication protocol for RFID system

Widespread deployment of RFID system arises security and privacy concern...
research
05/27/2019

Cryptanalysis of the SLAP Authentication Protocol

RFID (Radio Frequency Identification) is a powerful technology that, due...
research
09/14/2022

A Generic Privacy-Preserving Protocol For Keystroke Dynamics-Based Continuous Authentication

Continuous authentication utilizes automatic recognition of certain user...
research
09/01/2020

Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach

This work considers identity attack on a radio-frequency identification ...
research
04/15/2021

Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case

Today, the Internet of Things (IoT) is one of the emerging technologies ...

Please sign up or login with your details

Forgot password? Click here to reset