hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.24138/jcomss.v9i2.150

An Efficient and Private Authentication Protocol for RFID Systems

Suleyman Kardas ; TUBITAK BILGEMUEKAE, Kocaeli, Turkey
Serkan Celik ; TUBITAK BILGEMUEKAE, Kocaeli, Turkey
Mehmet Sariyuce ; TUBITAK BILGEMUEKAE, Kocaeli, Turkey
Albert Levi ; Faculty of Engineering and Natural Sciences (Computer Science Program), Sabancı University, ˙Istanbul, Turkey

Puni tekst: engleski, pdf (2 MB) str. 128-136 preuzimanja: 254* citiraj
APA 6th Edition
Kardas, S., Celik, S., Sariyuce, M. i Levi, A. (2013). An Efficient and Private Authentication Protocol for RFID Systems. Journal of Communications Software and Systems, 9 (2), 128-136. https://doi.org/10.24138/jcomss.v9i2.150
MLA 8th Edition
Kardas, Suleyman, et al. "An Efficient and Private Authentication Protocol for RFID Systems." Journal of Communications Software and Systems, vol. 9, br. 2, 2013, str. 128-136. https://doi.org/10.24138/jcomss.v9i2.150. Citirano 31.05.2020.
Chicago 17th Edition
Kardas, Suleyman, Serkan Celik, Mehmet Sariyuce i Albert Levi. "An Efficient and Private Authentication Protocol for RFID Systems." Journal of Communications Software and Systems 9, br. 2 (2013): 128-136. https://doi.org/10.24138/jcomss.v9i2.150
Harvard
Kardas, S., et al. (2013). 'An Efficient and Private Authentication Protocol for RFID Systems', Journal of Communications Software and Systems, 9(2), str. 128-136. https://doi.org/10.24138/jcomss.v9i2.150
Vancouver
Kardas S, Celik S, Sariyuce M, Levi A. An Efficient and Private Authentication Protocol for RFID Systems. Journal of Communications Software and Systems [Internet]. 2013 [pristupljeno 31.05.2020.];9(2):128-136. https://doi.org/10.24138/jcomss.v9i2.150
IEEE
S. Kardas, S. Celik, M. Sariyuce i A. Levi, "An Efficient and Private Authentication Protocol for RFID Systems", Journal of Communications Software and Systems, vol.9, br. 2, str. 128-136, 2013. [Online]. https://doi.org/10.24138/jcomss.v9i2.150

Sažetak
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, are vulnerable to security and privacy concerns such as data privacy, location privacy of tag owner and etc. Recently, Yeh et al.’s proposed a RFID authentication protocol based on quadratic residue which is claimed to provide location privacy and prevent possible attacks. In this paper, we formally analyzed the protocol and we proved that the protocol provides destructive privacy according to Vaudenay privacy model. Moreover, we proposed a unilateral authentication protocol and we prove that our protocol satisfies higher privacy level such as narrow strong privacy. Besides, we proposed an enhanced version of our proposed protocol, which has same privacy level as Yeh et al.’s protocol, but has reader authentication against stronger adversaries. Furthermore, the enhanced version of our protocol uses smaller number of cryptographic operations when compared to Yeh et al.’s protocol and it is also cost efficient at the server and tag side and requires O(1) complexity to identify a RFID tag.

Ključne riječi
RFID; Privacy; Security; Quadratic Residue

Hrčak ID: 180097

URI
https://hrcak.srce.hr/180097

Posjeta: 360 *