Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

RFID Mutual Authentication Protocols with Universally Composable Security

View through CrossRef
Universally Composable (UC) framework is the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols in a fully trusted environment, and indicate the flaws of some existing schemes under UC framework. We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and some trusted third parties which can be modeled as functionalities. We prove the security of our protocol under the strongest adversary model assuming both the tags' and readers' corruptions. Furthermore, we present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC); the other uses trusted certificates in Public Key Infrastructure (PKI).
Title: RFID Mutual Authentication Protocols with Universally Composable Security
Description:
Universally Composable (UC) framework is the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols.
In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols in a fully trusted environment, and indicate the flaws of some existing schemes under UC framework.
We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and some trusted third parties which can be modeled as functionalities.
We prove the security of our protocol under the strongest adversary model assuming both the tags' and readers' corruptions.
Furthermore, we present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC); the other uses trusted certificates in Public Key Infrastructure (PKI).

Related Results

RFID and Fingerprint Based Smart Bike Ignition System
RFID and Fingerprint Based Smart Bike Ignition System
The ascending rate of motorcycle larceny accentuates the desideratum for amended security solutions. Conventional key-predicated ignition systems are susceptible to unauthorized in...
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, t...
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
AbstractIn the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper prop...
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Unmanned aerial vehicles (UAVs) and radio frequency identification (RFID) technology are becoming very popular in the era of Industry 4.0, especially for retail, logistics, and war...
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
This paper addresses the want for evaluating consumer authentication protocols and protection algorithms for networks. Specially, this paper specializes in the effectiveness and sa...
The Lifelog Monitoring System for Honeybees: RFID and Camera Recordings in an Observation Hive
The Lifelog Monitoring System for Honeybees: RFID and Camera Recordings in an Observation Hive
A typical honeybee colony contains more than 15,000 individuals, each with its own task related to supporting the hive and maintaining the colony. In previous studies on honeybees,...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Automated Data Capture Technologies
Automated Data Capture Technologies
In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middlewar...

Back to Top