Efficient tag path authentication protocol with less tag memory

  • Hongbing Wang
  • , Yingjiu Li*
  • , Zongyang Zhang
  • , Yunlei Zhao
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, since it helps us maintain object pedigree and supply chain integrity. Meanwhile, tag path authentication must meet a series of security requirements, such as authentication, privacy, and unlinkability. In addition, the authentication protocol must be efficient. In 2011, the first tag path authentication protocol in an RFID-based supply chain, named “Tracker”, is proposed by Blass et al. in NDSS’11. They have made an important breakthrough in this research area. In this paper, we improve their work and propose a more efficient tag path authentication protocol in an RFID-based supply chain, which meets all the above mentioned security requirements. Our result shows that the proposed protocol can significantly reduce both computational overhead and memory requirement on tags, compared with the previous work.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 12th International Conference, ISPEC 2016, Proceedings
EditorsFeng Bao, Liqun Chen, Guojun Wang, Robert H. Deng
PublisherSpringer Verlag
Pages255-270
Number of pages16
ISBN (Print)9783319491509
DOIs
StatePublished - 2016
Event12th International Conference on Information Security Practice and Experience, ISPEC 2016 - Zhangjiajie, China
Duration: 16 Nov 201618 Nov 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10060 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Conference on Information Security Practice and Experience, ISPEC 2016
Country/TerritoryChina
CityZhangjiajie
Period16/11/1618/11/16

Keywords

  • RFID
  • Security and privacy
  • Tag path authentication
  • Unlinkability

Fingerprint

Dive into the research topics of 'Efficient tag path authentication protocol with less tag memory'. Together they form a unique fingerprint.

Cite this