A Cloud-based RFID Authentication Protocol with Insecure Communication Channels

Hannan Xiao, Awatif Alshehri, Bruce Christianson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)
459 Downloads (Pure)


Radio Frequency Identification (RFID) has becomea widespread technology to automatically identify objects and withthe development of cloud computing, cloud-based RFID systemsattract more research these days. Several cloud-based RFIDauthentication protocols have been proposed to address privacyand security properties in the environment where the cloudprovider is untrusted therefore the tag’s data are encrypted andanonymously stored in the cloud database. However, most of thecloud-based RFID authentication protocols assume securecommunication channels between the reader and the cloud server.To protect data transmission between the reader and the cloudserver without any help from a third party, this paper proposes acloud-based RFID authentication protocol with insecurecommunication channels (cloud-RAPIC) between the reader and the cloud server. The cloud-RAPIC protocol preserves tag privacyeven when the tag does not update its identification. The cloudRAPIC protocol has been analyzed using the UPriv model andAVISPA verification tool which have proved that the protocolpreserves tag privacy and protects data secrecy.
Original languageEnglish
Title of host publication2016 IEEE Trustcom/BigDataSE/ISPA
Subtitle of host publicationIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages8
ISBN (Electronic)9781509032051
ISBN (Print)9781509032068
Publication statusPublished - 9 Feb 2017
Event2016 IEEE Trustcom/BigDataSE/I​SPA - Tianjin University, Tianjin, China
Duration: 23 Aug 201626 Aug 2016
Conference number: 38078


Conference2016 IEEE Trustcom/BigDataSE/I​SPA
Internet address


Dive into the research topics of 'A Cloud-based RFID Authentication Protocol with Insecure Communication Channels'. Together they form a unique fingerprint.

Cite this