Secure and Private Protocols for Server-less RFID Systems

Server-less RFID systems are used more and more widespread recently, which allow RFID readers authenticating a specific tag without the help of on-line backend servers, it brings higher design requirements for RFID security protocols. In this paper, a mutual RFID authentication protocol and its corresponding serach ptotocol for server-less systems are proposed. The security properties of these protocols are analyzed as well by comparing with the related protocols.

[1]  Shang Yu,et al.  An Efficient RFID Authentication Protocol Supporting Tag Ownership Transfer , 2012 .

[2]  Ouyang Dantong,et al.  An Efficient Lightweight RFID Authentication Protocol for Low-cost Tags , 2011 .

[3]  Dong Hoon Lee,et al.  RFID tag search protocol preserving privacy of mobile reader holders , 2011, IEICE Electron. Express.

[4]  Zhen Zhang,et al.  A lightweight anti-desynchronization RFID authentication protocol , 2010, Inf. Syst. Frontiers.

[5]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Kai-Ping Chang,et al.  Lightweight and Serverless RFID Authentication and Search Protocol , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[7]  Tatsuo Nakajima,et al.  Secure and efficient tag searching in RFID systems using serverless search protocol , 2008 .

[8]  Yanjun Zuo Secure and private search protocols for RFID systems , 2010, Inf. Syst. Frontiers.

[9]  S.I. Ahamed,et al.  S3PR: Secure Serverless Search Protocols for RFID , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[10]  Jong Hyuk Park,et al.  Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments , 2010, Wirel. Pers. Commun..

[11]  Hung-Yu Chien,et al.  Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..

[12]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[13]  Chris J. Mitchell,et al.  Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..

[14]  Basel Alomair,et al.  Securing low-cost RFID systems: An unconditionally secure approach , 2011, J. Comput. Secur..