Abstract
In this paper, we propose an improved scheme to solve the security risks of S-S’s scheme. In order to resist the replay attack, the improved protocol uses the pseudo identifier XOR to encrypt the random number generated by the reader; the random number generated by the reader is added to the tag’s response message to resist the tag impersonation attack. In addition, this paper uses Avoine model to analyze the privacy of the improved protocol. The theoretical analysis shows that the proposed scheme can effectively resist against replay attack, tag impersonation attack, and de-synchronization attack. Moreover, the improved scheme can provide forward untraceability and tag untraceability. Compared with the existing RFID tag search protocol, the computational complexity of the tag and gate complexity on the tag side in the improved protocol is lower, the number of interaction with the reader is less, so the search for low-cost tags can be implemented more efficiently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tan, C.C., Sheng, B., Li, Q.: Secure and server-less RFID authentication and search protocols. IEEE Trans. Wirele. Commun. 7(4), 1400–1407 (2008)
Lee, C.F., Chien, H.Y., Laih, C.S.: Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun Syst 25(3), 376–385 (2012)
Yoon, E.-J.: Cryptanalysis of an RFID tag search protocol preserving privacy of mobile reader. In: Park, J.J., Zomaya, A., Yeo, S.-S., Sahni, S. (eds.) NPC 2012. LNCS, vol. 7513, pp. 575–580. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35606-3_68
Chen, C.M., Chen, S.M., Zheng, X., et al.: A secure RFID authentication protocol adopting error correction code. Sci. World J. 2014(1), 246–261 (2014)
Erguler, I.: A key recovery attack on error correcting code based a lightweight security protocol. IACR Cryptol. ePrint Arch. 2014(1), 475–485 (2014)
Jannati, H., Falahati, A.: An RFID search protocol secured against relay attack based on distance bounding approach. Wirel. Pers. Commun. 85(3), 711–726 (2015)
Wang, X., Jia, Q.X., Gao, X., et al.: Provable security lightweight service-less RFID security search srotocol. J. Hunan Univ. Nat. Sci. 41(8), 117–124 (2014)
Xie, W., Xie, L., Zhang, C., et al.: RFID seeking: finding a lost tag rather than only detecting its missing. J. Netw. Comput. Appl. 42(6), 135–142 (2014)
Jeon, I.S., Yoon, E.J.: An ultra-lightweight RFID seeking protocol for low-cost tags. Appl. Math. Sci. 8(125), 6245–6255 (2014)
Sundaresan, S., Doss, R., Piramuthu, S., et al.: Secure tag search in RFID systems using mobile readers. IEEE Trans. Dependable Sec. Comput. 12(2), 230–242 (2015)
Avoine, G.: Adversarial model for radio frequency identification. IACR Cryptol. ePrint Arch. 2005(7), 49–62 (2005)
Gu, B., Sheng, V.S., Tay, K.Y., et al.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403–1416 (2015)
Kong, Y., Zhang, M., Ye, D.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl.-Based Syst. 115, 123–132 (2017)
Chen, Y., Hao, C., Wu, W., et al.: Robust dense reconstruction by range merging based on confidence estimation. Sci. China Inf. Sci. 59(9), 1–11 (2016)
Acknowledgements
This work is supported by the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, P., Zhou, Z. (2017). An Improved RFID Search Protocol. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_76
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_76
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)