TY - GEN
T1 - Privacy protection for low-cost RFID tags in IoT systems
AU - Li, Ye
AU - Teraoka, Fumio
PY - 2012
Y1 - 2012
N2 - RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.
AB - RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.
KW - Low-cost RFID
KW - Mutual authentication
KW - Privacy protection
UR - http://www.scopus.com/inward/record.url?scp=84867705551&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867705551&partnerID=8YFLogxK
U2 - 10.1145/2377310.2377335
DO - 10.1145/2377310.2377335
M3 - Conference contribution
AN - SCOPUS:84867705551
SN - 9781450316903
T3 - Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12
SP - 60
EP - 65
BT - Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12
T2 - 7th International Conference on Future Internet Technologies, CFI'12
Y2 - 11 September 2012 through 12 September 2012
ER -