Skip to main content

An Improved RFID Search Protocol

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

  • 2522 Accesses

Abstract

In this paper, we propose an improved scheme to solve the security risks of S-S’s scheme. In order to resist the replay attack, the improved protocol uses the pseudo identifier XOR to encrypt the random number generated by the reader; the random number generated by the reader is added to the tag’s response message to resist the tag impersonation attack. In addition, this paper uses Avoine model to analyze the privacy of the improved protocol. The theoretical analysis shows that the proposed scheme can effectively resist against replay attack, tag impersonation attack, and de-synchronization attack. Moreover, the improved scheme can provide forward untraceability and tag untraceability. Compared with the existing RFID tag search protocol, the computational complexity of the tag and gate complexity on the tag side in the improved protocol is lower, the number of interaction with the reader is less, so the search for low-cost tags can be implemented more efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tan, C.C., Sheng, B., Li, Q.: Secure and server-less RFID authentication and search protocols. IEEE Trans. Wirele. Commun. 7(4), 1400–1407 (2008)

    Article  Google Scholar 

  2. Lee, C.F., Chien, H.Y., Laih, C.S.: Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun Syst 25(3), 376–385 (2012)

    Article  Google Scholar 

  3. Yoon, E.-J.: Cryptanalysis of an RFID tag search protocol preserving privacy of mobile reader. In: Park, J.J., Zomaya, A., Yeo, S.-S., Sahni, S. (eds.) NPC 2012. LNCS, vol. 7513, pp. 575–580. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35606-3_68

    Chapter  Google Scholar 

  4. Chen, C.M., Chen, S.M., Zheng, X., et al.: A secure RFID authentication protocol adopting error correction code. Sci. World J. 2014(1), 246–261 (2014)

    MathSciNet  Google Scholar 

  5. Erguler, I.: A key recovery attack on error correcting code based a lightweight security protocol. IACR Cryptol. ePrint Arch. 2014(1), 475–485 (2014)

    Google Scholar 

  6. Jannati, H., Falahati, A.: An RFID search protocol secured against relay attack based on distance bounding approach. Wirel. Pers. Commun. 85(3), 711–726 (2015)

    Article  Google Scholar 

  7. Wang, X., Jia, Q.X., Gao, X., et al.: Provable security lightweight service-less RFID security search srotocol. J. Hunan Univ. Nat. Sci. 41(8), 117–124 (2014)

    MathSciNet  Google Scholar 

  8. Xie, W., Xie, L., Zhang, C., et al.: RFID seeking: finding a lost tag rather than only detecting its missing. J. Netw. Comput. Appl. 42(6), 135–142 (2014)

    Article  Google Scholar 

  9. Jeon, I.S., Yoon, E.J.: An ultra-lightweight RFID seeking protocol for low-cost tags. Appl. Math. Sci. 8(125), 6245–6255 (2014)

    Google Scholar 

  10. Sundaresan, S., Doss, R., Piramuthu, S., et al.: Secure tag search in RFID systems using mobile readers. IEEE Trans. Dependable Sec. Comput. 12(2), 230–242 (2015)

    Article  Google Scholar 

  11. Avoine, G.: Adversarial model for radio frequency identification. IACR Cryptol. ePrint Arch. 2005(7), 49–62 (2005)

    Google Scholar 

  12. Gu, B., Sheng, V.S., Tay, K.Y., et al.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403–1416 (2015)

    Article  MathSciNet  Google Scholar 

  13. Kong, Y., Zhang, M., Ye, D.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl.-Based Syst. 115, 123–132 (2017)

    Article  Google Scholar 

  14. Chen, Y., Hao, C., Wu, W., et al.: Robust dense reconstruction by range merging based on confidence estimation. Sci. China Inf. Sci. 59(9), 1–11 (2016)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the Special Funds of Basic Research Business Expenses of Central University under Grant No. JUSRP51510.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ping Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, P., Zhou, Z. (2017). An Improved RFID Search Protocol. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_76

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics