Handling Authentication and Detection Probability in Multi-tag RFID Environment

In Radio Frequency Identification (RFID) technology, an adversary may access classified information about an object tagged with RFID tag. Therefore, authentication is a necessary requirement. Use of multiple tags in an object increases the detection probability and simultaneously ensures availability of multiple resources in the form of memory and computability. Authentication process in multi-tag arrangement may increase the traffic between reader and object and/or decrease the detection probability. Therefore the challenge is to keep intact the detection probability without increasing the traffic. Existence of multiple number of tags helps to distribute the authentication responsibility for an object among multiple number of tags. In this paper, we assume that an object is attached with multiple number of active tags and in each session a randomly selected tag is responsible for authentication process. The detection probability is intact since an active tag within the range of reader can be an intermediator.

[1]  Bo Sheng,et al.  Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[2]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[3]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[4]  Yanjun Wang,et al.  Securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2010, Expert Syst. Appl..

[5]  Widad Ismail,et al.  Security Problems in an RFID System , 2011, Wirel. Pers. Commun..

[6]  Moon-Seog Jun,et al.  Light-Weight Mutual Authentication RFD Protocol for Multi-Tags conforming to ESC Class-1 Generation-2 Standards , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[7]  Gene Tsudik A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.

[8]  Zhiliang Zhu,et al.  An Efficient RFID Tag-Reader Mutual Authentication Scheme , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Leonid Bolotnyy,et al.  Multi-tag RFID systems , 2007, Int. J. Internet Protoc. Technol..

[10]  Mike Burmester,et al.  Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.

[11]  Roberto Di Pietro,et al.  RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).