A novel mutual authentication scheme with minimum disclosure for rfid systems

Doss, Robin, Zhou, Wanlei, Yu, Shui and Gao, Longxiang 2011, A novel mutual authentication scheme with minimum disclosure for rfid systems, in ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, IEEE, [Adelaide, S. Aust.], pp. 544-549, doi: 10.1109/ISSNIP.2011.6146526.

Attached Files
Name Description MIMEType Size Downloads

Title A novel mutual authentication scheme with minimum disclosure for rfid systems
Author(s) Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Yu, ShuiORCID iD for Yu, Shui orcid.org/0000-0003-4485-6743
Gao, LongxiangORCID iD for Gao, Longxiang orcid.org/0000-0002-3026-7537
Conference name Intelligent Sensors, Sensor Networks and Information Processing. Conference (7th : 2011 : Adelaide, S. Aust.)
Conference location Adelaide, S. Aust.
Conference dates 6-9 Dec. 2011
Title of proceedings ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing
Editor(s) Nandagopal, D.
Palaniswami, M.
Gubbi, J.
Publication date 2011
Conference series Intelligent Sensors, Sensor Networks and Information Processing. Conference
Start page 544
End page 549
Total pages 6
Publisher IEEE
Place of publication [Adelaide, S. Aust.]
Keyword(s) authentication
databases
delay
privacy
radiofrequency identification
servers
Summary In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We take into account the computational constraints of EPC Class-1 Gen-2 passive RFID tags and only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are employed. Detailed security analysis of our scheme shows that it can offer robust security properties in terms of tag anonymity and tag untraceability while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the proposed scheme and its impact on authentication delay.
ISBN 1457706733
9781457706738
Language eng
DOI 10.1109/ISSNIP.2011.6146526
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30042388

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 451 Abstract Views, 13 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:46:45 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.