A cross-layer framework for privacy enhancement in RFID systems
Pervasive and Mobile Computing
A Security and Performance Evaluation of Hash-Based RFID Protocols
Information Security and Cryptology
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
A secure elliptic curve-based RFID protocol
Journal of Computer Science and Technology
Evaluation of the simple mutual authentication protocol for ISO/IEC 14443 smart cards
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Secure RFID authentication with efficient key-lookup
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Myopic sensing for multiple SUs in multichannel opportunistic access
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A coalitional game model for cooperative cognitive radio networks
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
The impact of reader to tag collision on RFID tag identification
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
International Journal of Electronic Security and Digital Forensics
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACSP: A novel security protocol against counting attack for UHF RFID systems
Computers & Mathematics with Applications
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
Informative counting: fine-grained batch authentication for large-scale RFID systems
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Randomized skip lists-based private authentication for large-scale RFID systems
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Maximum Likelihood Approach for RFID Tag Set Cardinality Estimation with Detection Errors
Wireless Personal Communications: An International Journal
CRFID: An RFID system with a cloud database as a back-end server
Future Generation Computer Systems
Personal and Ubiquitous Computing
Hi-index | 0.01 |
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking tags' private information. To achieve this goal, RFID tags issue encrypted authentication messages to the RFID reader, and the reader searches the key space to locate the tags. Due to the lack of efficient key updating algorithms, previous schemes are vulnerable to many active attacks, especially the compromising attack. In this paper, we propose a Strong and lightweight RFID Private Authentication protocol, SPA. By designing a novel key updating method, we achieve the forward secrecy in SPA with an efficient key search algorithm. We also show that, compared with existing designs, SPA is able to effectively defend against both passive and active attacks, including compromising attacks. Through prototype implementation, we observe that SPA is practical and scalable in current RFID infrastructures.