The 1st International ICST Workshop on the Internet of Things: Opportunities and Challenges

Research Article

Keeping it under control: A new authentication scheme for RFID tags

Download487 downloads
  • @INPROCEEDINGS{10.4108/iwiot.2010.5,
        author={Tongliang Li and Zhigang Jin and Hongguang Yang and Xiaokun Si},
        title={Keeping it under control: A new authentication scheme for RFID tags},
        proceedings={The 1st International ICST Workshop on the Internet of Things: Opportunities and Challenges},
        publisher={IEEE},
        proceedings_a={IWIOT},
        year={2011},
        month={1},
        keywords={RFID ownership transfer security privacy mutual authentication},
        doi={10.4108/iwiot.2010.5}
    }
    
  • Tongliang Li
    Zhigang Jin
    Hongguang Yang
    Xiaokun Si
    Year: 2011
    Keeping it under control: A new authentication scheme for RFID tags
    IWIOT
    IEEE
    DOI: 10.4108/iwiot.2010.5
Tongliang Li1,2,*, Zhigang Jin1,*, Hongguang Yang2,3,*, Xiaokun Si2,3,*
  • 1: Tianjin University, Tianjin, China
  • 2: Hebei Institute of Applied Mathematics, Shijiazhuang, China
  • 3: SJZ JKSS Technology CO.,Ltd, Shijiazhuang, China
*Contact email: litongliang@tom.com, zgjin@tju.edu.cn, hongguangyang@gmail.com, xiaokunsi@tom.com

Abstract

The increasingly used Radio Frequency Identification (RFID) systems are facing with the security and privacy concerns for the illegitimate reading and potential tracking reason. Many schemes have been proposed by using of cryptographic technology, while they are lacking the people's involvement. In this paper, we propose a new crypto-based scheme that makes users involved in the tag's authentication process by using of physical privacy type assistant tags. Before identifying common tags, the reader needs to get some data from the assistant tags first. The data make the shared secret between the tag and the back-end database different. It not only keeps the tag can be read or not under user's control, but also makes the scheme safer even if the data on back-end database is revealed. Light weight block ciphers or hash functions can be employed in our scheme; a contrast of the performance is also given after the security and privacy analysis.