Research Article
A Cloud-Based Distance Bounding Protocol for RFID Conforming to EPC-C1 G2 Standards
@INPROCEEDINGS{10.1007/978-3-319-78139-6_32, author={Zhenjiang Dong and Xinluo Wang and Miao Lei and Wei Wang and Hui Li}, title={A Cloud-Based Distance Bounding Protocol for RFID Conforming to EPC-C1 G2 Standards}, proceedings={Communications and Networking. 12th International Conference, ChinaCom 2017, Xi’an, China, October 10-12, 2017, Proceedings, Part II}, proceedings_a={CHINACOM}, year={2018}, month={4}, keywords={RFID Authentication Distance bounding Cloud computing}, doi={10.1007/978-3-319-78139-6_32} }
- Zhenjiang Dong
Xinluo Wang
Miao Lei
Wei Wang
Hui Li
Year: 2018
A Cloud-Based Distance Bounding Protocol for RFID Conforming to EPC-C1 G2 Standards
CHINACOM
Springer
DOI: 10.1007/978-3-319-78139-6_32
Abstract
The development and maturation of cloud computing provides a new idea for deploying RFID systems. A Cloud-based RFID system becomes a new promising architecture. It can be offered as a service of cloud computing to individuals and organizations. However, the cloud-based RFID systems are confronted with more special security and privacy threats, especially the untrustworthy cloud provider and insecure backward communications. Unfortunately, most current RFID authentication schemes fail to meet the special security and privacy requirements of cloud-based RFID, i.e. to provide anonymity and confidentiality against the cloud and build secure backend channels. In this paper, we propose a secure distance bounding protocol for a RFID system, which is cloud-based RFID mutual authentication protocol compatible with the mature EPC-C1 G2 standards. It can effectively resist various threats in cloud environment comparing with other cloud-based RFID authentication protocol and reduce the success probability of a Mafia attack and make it lower than the optimal situation in academic circles.