{"title":"An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens","authors":"Min Chen, Shigang Chen","doi":"10.1109/ICDCS.2015.94","DOIUrl":null,"url":null,"abstract":"Radio frequency identification (RFID) technologies are widely used in many applications. The widespread use of tags in traditional ways of deployment raises a privacy concern: They make their carriers track able. This paper studies the problem of anonymous authentication. Due to resource constraints of low-cost tags, we develop a new technique to generate dynamic tokens for anonymous authentication by following an asymmetric design principle that pushes most complexity to more powerful RFID readers. Instead of implementing complicated cryptographic hash functions, our authentication protocol only requires tags to perform several simple hardware-efficient operations such as bitwise XOR, one-bit left circular shift and bit flip. Moreover, our protocol reduces the communication overhead and online computation overhead to O(1) per authentication for both tags and readers, which compares favorably with the prior art.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 35th International Conference on Distributed Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCS.2015.94","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
Radio frequency identification (RFID) technologies are widely used in many applications. The widespread use of tags in traditional ways of deployment raises a privacy concern: They make their carriers track able. This paper studies the problem of anonymous authentication. Due to resource constraints of low-cost tags, we develop a new technique to generate dynamic tokens for anonymous authentication by following an asymmetric design principle that pushes most complexity to more powerful RFID readers. Instead of implementing complicated cryptographic hash functions, our authentication protocol only requires tags to perform several simple hardware-efficient operations such as bitwise XOR, one-bit left circular shift and bit flip. Moreover, our protocol reduces the communication overhead and online computation overhead to O(1) per authentication for both tags and readers, which compares favorably with the prior art.