...
首页> 外文期刊>Wireless personal communications: An Internaional Journal >An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment
【24h】

An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment

机译:使用云计算环境跟踪具有多个RFID标记的对象的身份验证协议

获取原文
获取原文并翻译 | 示例
           

摘要

In supply chain management applications, detection of a large object is made efficient by attaching multiple RFID tags in that object. Each part contains an RFID tag attached by the corresponding vendor. In order to check the availability of the object, it is compulsory to ensure all the parts are existing as well. The RFID tags can be interrogated by any reader deployed in the department. This approach enhances the object detection probability for each object but increases security and privacy risks. The communication between RFID readers and the tags in the same department is to be authenticated by preserving the privacy of both reader and the tag. Several researchers have developed variants of grouping protocol for authentication and for searching the tags. In this article, Shen et al.'s scheme for authenticating multiple tags in a group is analyzed and found that secret parameters are leaked in that scheme and it is not applicable for dynamic inclusion of tags. Also, an efficient authentication protocol for the multi-tag scenario to overcome the above mentioned issues is designed and analyzed in this paper. We propose an authentication protocol for communication between an object attached with multiple tags and RFID reader deployed in the department. We store the details about the object and its associated tags, and the readers in the cloud. Cloud storage provides scalability and anywhere anytime access. The communication between the reader and the cloud server is also authenticated. The proposed protocol is formally analyzed using GNY logic to prove the mutual authentication. Informal analysis proves the efficiency of the proposed protocol against known attacks. We also analyze our protocol using automatic cryptographic protocol verifier tool ProVerif version 1.96.
机译:在供应链管理应用中,通过在该对象中附加多个RFID标签,对大型物体的检测有效。每个部分包含相应的供应商附加的RFID标签。为了检查对象的可用性,强制性地确保所有部件也存在。 RFID标签可以由部署在部门的任何读者询问。这种方法可以增强每个对象的对象检测概率,但增加了安全性和隐私风险。通过保留读取器和标记的隐私来验证RFID读取器与同一部门中的标签之间的通信。几个研究人员开发了用于认证和搜索标签的分组协议的变体。在本文中,Shen等人分析了用于验证组中的多个标签的方案,并发现在该方案中泄漏了秘密参数,并且不适用于动态包含标签。此外,在本文中设计并分析了用于克服上述问题的多标记方案的有效认证协议。我们提出了一个认证协议,用于连接有多个标签和部署在部门的RFID读者的对象之间的通信。我们存储有关对象及其相关标签的详细信息,以及云中的读取器。云存储提供可扩展性和随时随地访问。读取器和云服务器之间的通信也经过身份验证。使用GNY逻辑正式分析所提出的协议,以证明相互认证。非正式分析证明了拟议议定书对已知攻击的效率。我们还使用自动加密协议验证程序Proverif版本1.96分析我们的协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号