Communications and Networking. 12th International Conference, ChinaCom 2017, Xi’an, China, October 10-12, 2017, Proceedings, Part II

Research Article

A Cloud-Based Distance Bounding Protocol for RFID Conforming to EPC-C1 G2 Standards

Download
147 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-78139-6_32,
        author={Zhenjiang Dong and Xinluo Wang and Miao Lei and Wei Wang and Hui Li},
        title={A Cloud-Based Distance Bounding Protocol for RFID Conforming to EPC-C1 G2 Standards},
        proceedings={Communications and Networking. 12th International Conference, ChinaCom 2017, Xi’an, China, October 10-12, 2017, Proceedings, Part II},
        proceedings_a={CHINACOM},
        year={2018},
        month={4},
        keywords={RFID Authentication Distance bounding Cloud computing},
        doi={10.1007/978-3-319-78139-6_32}
    }
    
  • Zhenjiang Dong
    Xinluo Wang
    Miao Lei
    Wei Wang
    Hui Li
    Year: 2018
    A Cloud-Based Distance Bounding Protocol for RFID Conforming to EPC-C1 G2 Standards
    CHINACOM
    Springer
    DOI: 10.1007/978-3-319-78139-6_32
Zhenjiang Dong,*, Xinluo Wang1,*, Miao Lei1,*, Wei Wang2,*, Hui Li1,*
  • 1: Beijing University of Posts and Telecommunications
  • 2: ZTE Cloud Computing and IT Research Institute
*Contact email: dong.zhenjiang@zte.com.cn, 2013212985@bupt.edu.cn, sinper1005@163.com, wang.wei8@zte.com.cn, lihuill@bupt.edu.cn

Abstract

The development and maturation of cloud computing provides a new idea for deploying RFID systems. A Cloud-based RFID system becomes a new promising architecture. It can be offered as a service of cloud computing to individuals and organizations. However, the cloud-based RFID systems are confronted with more special security and privacy threats, especially the untrustworthy cloud provider and insecure backward communications. Unfortunately, most current RFID authentication schemes fail to meet the special security and privacy requirements of cloud-based RFID, i.e. to provide anonymity and confidentiality against the cloud and build secure backend channels. In this paper, we propose a secure distance bounding protocol for a RFID system, which is cloud-based RFID mutual authentication protocol compatible with the mature EPC-C1 G2 standards. It can effectively resist various threats in cloud environment comparing with other cloud-based RFID authentication protocol and reduce the success probability of a Mafia attack and make it lower than the optimal situation in academic circles.