TY - GEN
T1 - Efficient tag path authentication protocol with less tag memory
AU - Wang, Hongbing
AU - Li, Yingjiu
AU - Zhang, Zongyang
AU - Zhao, Yunlei
N1 - Publisher Copyright:
© Springer International Publishing AG 2016.
PY - 2016
Y1 - 2016
N2 - Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, since it helps us maintain object pedigree and supply chain integrity. Meanwhile, tag path authentication must meet a series of security requirements, such as authentication, privacy, and unlinkability. In addition, the authentication protocol must be efficient. In 2011, the first tag path authentication protocol in an RFID-based supply chain, named “Tracker”, is proposed by Blass et al. in NDSS’11. They have made an important breakthrough in this research area. In this paper, we improve their work and propose a more efficient tag path authentication protocol in an RFID-based supply chain, which meets all the above mentioned security requirements. Our result shows that the proposed protocol can significantly reduce both computational overhead and memory requirement on tags, compared with the previous work.
AB - Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, since it helps us maintain object pedigree and supply chain integrity. Meanwhile, tag path authentication must meet a series of security requirements, such as authentication, privacy, and unlinkability. In addition, the authentication protocol must be efficient. In 2011, the first tag path authentication protocol in an RFID-based supply chain, named “Tracker”, is proposed by Blass et al. in NDSS’11. They have made an important breakthrough in this research area. In this paper, we improve their work and propose a more efficient tag path authentication protocol in an RFID-based supply chain, which meets all the above mentioned security requirements. Our result shows that the proposed protocol can significantly reduce both computational overhead and memory requirement on tags, compared with the previous work.
KW - RFID
KW - Security and privacy
KW - Tag path authentication
KW - Unlinkability
UR - https://www.scopus.com/pages/publications/84996536336
U2 - 10.1007/978-3-319-49151-6_18
DO - 10.1007/978-3-319-49151-6_18
M3 - 会议稿件
AN - SCOPUS:84996536336
SN - 9783319491509
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 255
EP - 270
BT - Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Proceedings
A2 - Bao, Feng
A2 - Chen, Liqun
A2 - Wang, Guojun
A2 - Deng, Robert H.
PB - Springer Verlag
T2 - 12th International Conference on Information Security Practice and Experience, ISPEC 2016
Y2 - 16 November 2016 through 18 November 2016
ER -