A Forward Secure RFID Privacy Protection Scheme with Two-Way Authentication

2010 ◽  
Vol 29-32 ◽  
pp. 2262-2266
Author(s):  
Yong Gan ◽  
Lei He ◽  
Tao Zhang ◽  
Na Na Li

RFID has become an important infrastructure technology. However, it does not solve information security problem. An adversary can eavesdrop on the messages exchanged between tag and backend database and track tag’s holder. Many scholars have proposed some lightweight protocols in order to protect user’s privacy and avoid various attacks. In this paper, we analyze some authentication protocols. Especially, we analyze a forward secure RFID privacy protection scheme proposed by Ohkubo et al. Afterwards, we propose an improved protection scheme with two-way authentication. It is lightweight and suitable for low-cost RFID system. Moreover, it not only provides indistinguishability and forward security but also provides two-way authentication.

2010 ◽  
Vol 29-32 ◽  
pp. 2267-2272
Author(s):  
Lei He ◽  
Yong Gan ◽  
Na Na Li ◽  
Tao Zhang

Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide security protection in the RFID system. In the paper, we mainly research lightweight authentication protocols in RFID system. Firstly, we analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide forward security. Thirdly, we propose a revised serverless authentication protocol with forward security. It provides two-way authentication and privacy protection, resists tracking and cloning attack as well as the original protocol. Moreover, it provides forward security protection and resists desynchronization attack. For the efficiency, its computational complexity is at the same level with the protocol proposed by Tan et al.


2010 ◽  
Vol 29-32 ◽  
pp. 2709-2713
Author(s):  
Xin Mei Lu ◽  
Lei He

It is necessary for researchers to design lightweight authentication protocols to protect information security between tag and reader in RFID system. It is a great challenge to design an efficient and secure protocol because the tag has limited computation resource. In the paper, we firstly analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide two-way authentication. Thirdly, we propose a modified two-way authentication protocol without server for RFID. The result indicates it provides privacy protection, resists tracking, and resists cloning attack. Moreover, it provides two-way authentication. For the efficiency, we think the computational complexity of our protocol is at the same level with the original protocol.


Author(s):  
Pierre-Francois Bonnefoi ◽  
Pierre Dusart ◽  
Damien Sauveron ◽  
Raja Naeem Akram ◽  
Konstantinos Markantonakis

Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5824
Author(s):  
Souhir Gabsi ◽  
Vincent Beroulle ◽  
Yann Kieffer ◽  
Hiep Manh Dao ◽  
Yassin Kortli ◽  
...  

The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach the required security and confidentiality requirements for data transfer, elliptic curve cryptography (ECC) is a powerful solution, which ensures a tag/reader mutual authentication and guarantees data integrity. In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. We compare the various lightweight ECC primitive implementations designed for RFID applications in terms of occupied area and power consumption. Then, we highlight the security threats that can be encountered considering both network attacks and side-channel attacks and analyze the security effectiveness of RFID authentication protocols against such types of attacks. For this purpose, we classify the different threats that can target an ECC-based RFID system. After that, we present the most promising ECC-based protocols released during 2014–2021 by underlining their advantages and disadvantages. Finally, we perform a comparative study between the different protocols mentioned regarding network and side-channel attacks, as well as their implementation costs to find the optimal one to use in future works.


Author(s):  
Karan S Belsare ◽  
Gajanan D Patil

A low cost and reliable protection scheme has been designed for a three phase induction motor against unbalance voltages, under voltage, over voltage, short circuit and overheating protection. Taking the cost factor into consideration the design has been proposed using microcontroller Atmega32, MOSFETs, relays, small CTs and PTs. However the sensitivity of the protection scheme has been not compromised. The design has been tested online in the laboratory for small motors and the same can be implemented for larger motors by replacing the i-v converters and relays of suitable ratings.


Sign in / Sign up

Export Citation Format

Share Document