A secure and private RFID authentication protocol based on quadratic residue

Warning The system is temporarily closed to updates for reporting purpose.

Kardaş, Süleyman and Çelik, Serkan and Sarıyüce, Mehmet and Levi, Albert (2012) A secure and private RFID authentication protocol based on quadratic residue. In: 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2012), Split, Croatia

PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader


Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, are vulnerable to security and privacy concerns such as data privacy, location privacy of tag owner and etc. Recently, Yeh et al.'s proposed a RFID authentication protocol based on quadratic residue which is claimed to provide location privacy and prevent possible attacks. In this paper, we formally analyzed the protocol and we proved that the protocol provides destructive privacy according to Vaudenay privacy model. Moreover, we proposed a unilateral authentication protocol and we prove that our protocol satisfies higher privacy level such as narrow strong privacy. Besides, we proposed an enhanced version of our proposed protocol, which has same privacy level as Yeh at al protocol, but has reader authentication against stronger adversaries. Furthermore, the enhanced version of our protocol uses smaller number of cryptographic operations when compared to Yeh at al protocol and it is also cost efficient at the server and tag side and requires O(1) complexity to identify a RFID tag.

Item Type:Papers in Conference Proceedings
Uncontrolled Keywords:Privacy , Quadratic Residue , RFID , Security
ID Code:20554
Deposited By:Albert Levi
Deposited On:06 Dec 2012 15:45
Last Modified:31 Jul 2019 15:36

Repository Staff Only: item control page