ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience

As RFID applications become widespread, different authentication schemes have been proposed to address the security and privacy issues in RFID systems. Most recent protocols have employed a "central server" model. This kind of authentication is vulnerable to Dos attack. In this paper, we present an RFID offline authentication protocol with Dos resilience, ROAD, which provides a more flexible and privacy preserving authentication without the need of a central server. Moreover, we suggest another offline scheme, ROAD+ for a targeted tag authentication with high search efficiency. We also show that ROAD+ provides a technical support for an absolutely new application of RFID systems.

[1]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[2]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[3]  Lei Hu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[4]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[5]  Gregory J. Walters,et al.  Privacy and security: an ethical analysis , 2001, CSOC.

[6]  Mike Burmester,et al.  Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.

[7]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Lei Hu,et al.  Privacy-preserving authentication with low computational overhead for RFID systems , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[9]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[10]  Vassilis Kostakos,et al.  rfid in pervasive computing: State-of-the-art and outlook , 2009, Pervasive Mob. Comput..

[11]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography , 2008 .

[12]  Andrei V. Kelarev,et al.  The Theory of Information and Coding , 2005 .

[13]  Tharam S. Dillon,et al.  Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database , 2007, MSN.

[14]  Song Han,et al.  Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor , 2007, ICCSA.

[15]  Dong Hoon Lee,et al.  Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.

[16]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[17]  Bo Sheng,et al.  Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[18]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[19]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.