Loading...

Unified privacy analysis of new-found RFID authentication protocols

Alagheband, M. R ; Sharif University of Technology | 2013

363 Viewed
  1. Type of Document: Article
  2. DOI: 10.1002/sec.650
  3. Publisher: 2013
  4. Abstract:
  5. Ubiquitousness of Radio Frequency Identification (RFID) systems with inherent weaknesses has been a cause of concern about their privacy and security. Therefore, secure protocols are essentially necessary for the RFID tags to guarantee privacy and authentication among them and the reader. This paper inspects privacy in the RFID systems. First, we survey four new-found RFID authentication protocols, and then, their weaknesses in formal privacy model are analyzed. Although the authors of the schemes claimed that their protocols completely resist privacy attacks, we formally prove that all of them suffer from the family of traceability attacks. Furthermore, not only are the four improved protocols proposed to prevent the aforementioned attacks, but also we provide formal analysis to guarantee the security and privacy of the proposed enhancements
  6. Keywords:
  7. Authentication protocol ; Privacy model ; RFID systems ; Traceability ; Authentication protocols ; Privacy and security ; Privacy models ; Rfid authentication protocols ; Security and privacy ; Traceability attacks ; Authentication ; Data privacy ; Radio systems ; Radio frequency identification (RFID)
  8. Source: Security and Communication Networks ; Volume 6, Issue 8 , 2013 , Pages 999-1009 ; 19390122 (ISSN)
  9. URL: http://onlinelibrary.wiley.com/doi/10.1002/sec.650/abstract;jsessionid=3D5CEBE03F8F36C6CF11D2EA760F3D25.f04t04