University of Hertfordshire

By the same authors

A Cloud-based RFID Authentication Protocol with Insecure Communication Channels

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Documents

View graph of relations
Original languageEnglish
Title of host publication2016 IEEE Trustcom/BigDataSE/ISPA
Subtitle of host publicationIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
PublisherIEEE
Pages332-339
Number of pages8
ISBN (Electronic)9781509032051
ISBN (Print)9781509032068
DOIs
Publication statusPublished - 9 Feb 2017
Event2016 IEEE Trustcom/BigDataSE/I​SPA - Tianjin University, Tianjin, China
Duration: 23 Aug 201626 Aug 2016
Conference number: 38078
http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=38078

Conference

Conference2016 IEEE Trustcom/BigDataSE/I​SPA
CountryChina
CityTianjin
Period23/08/1626/08/16
Internet address

Abstract

Radio Frequency Identification (RFID) has becomea widespread technology to automatically identify objects and withthe development of cloud computing, cloud-based RFID systemsattract more research these days. Several cloud-based RFIDauthentication protocols have been proposed to address privacyand security properties in the environment where the cloudprovider is untrusted therefore the tag’s data are encrypted andanonymously stored in the cloud database. However, most of thecloud-based RFID authentication protocols assume securecommunication channels between the reader and the cloud server.To protect data transmission between the reader and the cloudserver without any help from a third party, this paper proposes acloud-based RFID authentication protocol with insecurecommunication channels (cloud-RAPIC) between the reader and the cloud server. The cloud-RAPIC protocol preserves tag privacyeven when the tag does not update its identification. The cloudRAPIC protocol has been analyzed using the UPriv model andAVISPA verification tool which have proved that the protocolpreserves tag privacy and protects data secrecy.

Notes

© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

ID: 10244801