Skip to main content

A Desynchronization Tolerant RFID Private Authentication Protocol

  • Conference paper
Book cover Wireless Algorithms, Systems, and Applications (WASA 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6221))

  • 1076 Accesses

Abstract

Previous designed synchronization approaches advocate an O(1) search complexity. Although it is efficient, such an approach is vulnerable to Desynchronization Attacks, in which the secret information will become incrementally different between the tag and reader. Either adversary can utilize this to distinguish tags or the legitimate tag and reader cannot authenticate with each other. Even worse, synchronization approaches suffer from replay attacks. To address these problems, we propose a DESynchronization Tolerant RFID private authentication protocol, DEST, which forces a tag to keep its behaviors undistinguishable. DEST provides desynchronization tolerance, replay attack resistance, and forward secrecy. The analysis results show that DEST effectively enhances the privacy protection for RFID private authentication, and provides the same efficiency, O(1), as traditional synchronization approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bibliography on Security and Privacy in RFID Systems, http://www.avoine.net/rfid

  2. Juels, A.: RFID Security and Privacy: a Research Survey. IEEE Journal on Selected Areas in Communication 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  3. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-friendly Tags. In: Proceedings of RFID Privacy Workshop. MIT, Cambridge (2003)

    Google Scholar 

  4. Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain based RFID Privacy Protection Scheme. In: Proceedings of UbiComp, Workshop Privacy (2004)

    Google Scholar 

  5. Henrici, D., Mller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers. In: Proceedings of IEEE PerCom Workshops (2004)

    Google Scholar 

  6. Juels, A.: Minimalist Cryptography for Low-Cost RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Yao, Q., Qi, Y., Han, J., Zhao, J., Li, X., Liu, Y.: Randomizing RFID Private Authentication. In: Proceedings of IEEE PerCom (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yao, Q., Qi, Y., Chen, Y., Zhong, X. (2010). A Desynchronization Tolerant RFID Private Authentication Protocol. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2010. Lecture Notes in Computer Science, vol 6221. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14654-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14654-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14653-4

  • Online ISBN: 978-3-642-14654-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics