RFID ownership transfer protocol based on cloud

RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie etźal. (2013) 3 and Doss etźal. (2013) 9. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.

[1]  Chien-Hung Wu,et al.  Improvement of the RFID authentication scheme based on quadratic residues , 2011, Comput. Commun..

[2]  Wanlei Zhou,et al.  Secure RFID Tag Ownership Transfer Based on Quadratic Residues , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Albert Levi,et al.  A New Security and Privacy Framework for RFID in Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[4]  Wanlei Zhou,et al.  A secure tag ownership transfer scheme in a closed loop RFID system , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[5]  Li Na Sun Building Intelligent Parking Lot Based on RFID and Cloud Computing Technology , 2013 .

[6]  Albert Levi,et al.  An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer , 2013, LightSec.

[7]  Daqiang Zhang,et al.  An Efficient RFID Search Protocol Based On Clouds , 2015, Mobile Networks and Applications.

[8]  Xin Wang,et al.  Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism , 2014, IET Inf. Secur..

[9]  Gul N. Khan,et al.  Low-cost authentication protocol for passive, computation capable RFID tags , 2015, Wirel. Networks.

[10]  Serge Vaudenay,et al.  On Privacy Models for RFID , 2007, ASIACRYPT.

[11]  Elisa Bertino,et al.  Cryptanalysis of Some RFID Authentication Protocols , 2008, J. Commun..

[12]  Jack Douglas PROBLEMS IN MEASURING PROBLEM-SOLVING IN DISCUSSION , 1953 .

[13]  Chen Zhang,et al.  TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer , 2014, Secur. Commun. Networks.

[14]  Hung-Min Sun,et al.  Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).

[15]  Chen Zhang,et al.  Cloud-based RFID authentication , 2013, 2013 IEEE International Conference on RFID (RFID).

[16]  Cheng-Chi Lee,et al.  A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.

[17]  Hung-Min Sun,et al.  CRFID: An RFID system with a cloud database as a back-end server , 2014, Future Gener. Comput. Syst..

[18]  Jue-Sam Chou,et al.  A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems , 2009, IACR Cryptol. ePrint Arch..

[19]  Mohammad Reza Aref,et al.  Simulation-Based Traceability Analysis of RFID Authentication Protocols , 2014, Wirel. Pers. Commun..

[20]  Fuchun Guo,et al.  Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme , 2013, Wirel. Pers. Commun..

[21]  R. C. Mittal,et al.  A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.

[22]  D. Boopathy,et al.  Secured Cloud Data Storage––Prototype Trust Model for Public Cloud Storage , 2016 .

[23]  Wanlei Zhou,et al.  A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems , 2013, Ad Hoc Networks.

[24]  Jiang Wu,et al.  Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes , 2011, Wirel. Pers. Commun..

[25]  Josep M. Miret,et al.  A Secure Elliptic Curve-Based RFID Protocol , 2009, Journal of Computer Science and Technology.