iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1145/1529282.1529514
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol | Proceedings of the 2009 ACM symposium on Applied Computing skip to main content
10.1145/1529282.1529514acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Supporting recovery, privacy and security in RFID systems using a robust authentication protocol

Published: 08 March 2009 Publication History

Abstract

RFID systems have been scrutinized nowadays as one of the emerging technologies in pervasive environment. And authentication becomes indispensible in applications where security and privacy are major concerns. Besides thwarting some major attacks, RFID systems need to be able to recover from unexpected conditions during operation. In this paper, we propose a Robust Authentication Protocol (RoAP) that supports not only security and privacy, but also recovery in RFID systems. The protocol can get back the desynchronized tags and readers to their normal state, and thus provides robustness. We also present a "safety ring" consisted of six major goals that have to ensure by each RFID system to be secured. This paper illustrates security and robustness analysis of the protocol. Finally, we present the implementation of our authentication protocol.

References

[1]
Ahamed, S. I., Rahman. F., Hoque, E., Kawsar, F., and Nakajima, T. YA-SRAP: Yet Another Serverless RFID Authentication Protocol. In the 4th IET International Conference on Intelligent Environment (IE08), Seattle, USA, Jul 2008.
[2]
Avoine., G. Security and Privacy in RFID Systems. http://www.avoine.net/rfid/, 2008.
[3]
Avoine, G. and Oechslin, P. A Scalable and Provably Secure Hash Based RFID Protocol. In International Workshop on Pervasive Computing and Communication Security (PerSec '05), IEEE, IEEE Computer Society Press, pp. 110--114, Kauai Island, Hawaii, USA, March 2005.
[4]
Conti, M., Pietro, R. D., Mancini, L. V., and Spognardi. A. RIPP-FS: an RFID Identification, Privacy Preserving Protocol with Forward Secrecy. In International Workshop on Pervasive Computing and Communication Security (PerSec '07), IEEE, IEEE Computer Society Press, pp. 229--234, New York, USA, Mar. 2007.
[5]
Juels, A. RFID Security and Privacy: A Research Survey. Manuscript, Sep. 2005.
[6]
Juels, A. and Weis, S. Defining Strong Privacy for RFID. Cryptology ePrint Archive, Report 2006/137, IACR, Apr. 2006.
[7]
Ohkubo, M., Suzuki, K., and Kinoshita, S. Cryptographic Approach to "Privacy-Friendly" Tags. In RFID Privacy Workshop, MIT, MA, USA, Nov 2003.
[8]
Seo, Y., and Kim, K. Scalable and Untraceable Authentication Protocol for RFID. In International Workshop on Security in Ubiquitous Computing Systems (Secubiq '06), Springer-Verlag, Seoul, Korea, August 2006.
[9]
Tsudik, G. YA-TRAP: Yet another Trivial RFID Authentication Protocol. In International Conference on Pervasive Computing and Communication (PerCom '06), IEEE, IEEE Computer Society Press, Pisa, Italy, Mar. 2006.

Cited By

View all
  • (2017)A privacy preserving framework for RFID based healthcare systemsFuture Generation Computer Systems10.1016/j.future.2016.06.00172(339-352)Online publication date: Jul-2017
  • (2014)Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocolsPersonal and Ubiquitous Computing10.1007/s00779-012-0629-818:1(177-188)Online publication date: 1-Jan-2014
  • (2013)Analysis and Improvement of Anonymous Authentication Protocol for Low-Cost RFID SystemsFoundations and Applications of Intelligent Systems10.1007/978-3-642-37829-4_60(723-732)Online publication date: 23-Nov-2013
  • Show More Cited By

Index Terms

  1. Supporting recovery, privacy and security in RFID systems using a robust authentication protocol

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
    March 2009
    2347 pages
    ISBN:9781605581668
    DOI:10.1145/1529282
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 March 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RFID
    2. authentication
    3. privacy
    4. recovery
    5. robust
    6. security

    Qualifiers

    • Research-article

    Conference

    SAC09
    Sponsor:
    SAC09: The 2009 ACM Symposium on Applied Computing
    March 8, 2009 - March 12, 2008
    Hawaii, Honolulu

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 03 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)A privacy preserving framework for RFID based healthcare systemsFuture Generation Computer Systems10.1016/j.future.2016.06.00172(339-352)Online publication date: Jul-2017
    • (2014)Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocolsPersonal and Ubiquitous Computing10.1007/s00779-012-0629-818:1(177-188)Online publication date: 1-Jan-2014
    • (2013)Analysis and Improvement of Anonymous Authentication Protocol for Low-Cost RFID SystemsFoundations and Applications of Intelligent Systems10.1007/978-3-642-37829-4_60(723-732)Online publication date: 23-Nov-2013
    • (2012)DRAPProceedings of the 27th Annual ACM Symposium on Applied Computing10.1145/2245276.2245372(498-503)Online publication date: 26-Mar-2012
    • (2012)Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol2012 IEEE International Conference on Pervasive Computing and Communications Workshops10.1109/PerComW.2012.6197623(811-816)Online publication date: Mar-2012
    • (2012)An efficient authentication protocol for serverless RFID systems2012 IEEE 14th International Conference on Communication Technology10.1109/ICCT.2012.6511283(640-644)Online publication date: Nov-2012
    • (2012)I am not a goldfish in a bowl: A privacy preserving framework for RFID based healthcare systems2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom)10.1109/HealthCom.2012.6379432(335-340)Online publication date: Oct-2012
    • (2012)An efficient and secure authentication protocol for RFID systemsInternational Journal of Automation and Computing10.1007/s11633-012-0642-49:3(257-265)Online publication date: 1-Jun-2012
    • (2012)Security Risks Associated with Radio Frequency Identification in Medical EnvironmentsJournal of Medical Systems10.1007/s10916-011-9792-036:6(3491-3505)Online publication date: 1-Dec-2012
    • (2010)A Framework for RFID Survivability Requirement Analysis and SpecificationInnovations in Computing Sciences and Software Engineering10.1007/978-90-481-9112-3_26(153-159)Online publication date: 20-May-2010

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media