Efficient Tag Path Authentication Protocol with Less Tag Memory

@inproceedings{Wang2016EfficientTP,
  title={Efficient Tag Path Authentication Protocol with Less Tag Memory},
  author={Hongbing Wang and Yingjiu Li and Zongyang Zhang and Yunlei Zhao},
  booktitle={ISPEC},
  year={2016}
}
Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues, e.g., the counterfeits of expensive goods pose a serious threat to supply chain management. As a result, path authentication becomes especially important in supply chain management, since it helps us maintain object pedigree and supply chain integrity. Meanwhile, tag path authentication… 
SupAUTH: A new approach to supply chain authentication for the IoT
TLDR
This paper outlines the current state‐of‐the‐art cryptographic solutions for path authentication, highlights their properties and weakness, and proposes a novel, privacy‐preserving, and efficient solution, which is suitable for any suitable low‐cost radio‐frequency identification deployment in IoT.
A Lightweight Path Authentication Protocol for RFID-Based Supply Chains
  • Yuyin Qian, Peng Zeng, Zuming Shen, Kim-Kwang Raymond Choo
  • Computer Science
    2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
  • 2018
TLDR
A new tag path authentication protocol for RFID-based supply chains, which further reduces the memory space from 800 bits to 640 bits, and removes the strong assumption that the manager in the system needs to store all readers' private keys in Wang et al.'s protocol and the "Tracker".
An RFID Path Authentication Protocol Based on Chebyshev Polynomials
TLDR
This paper applies Chebyshev polynomials to RFID path authentication protocol in the supply chain and provides a simple identity authentication protocol between readers and tags that reduces the calculation time and has a lower memory requirement of tags.
Every Step You Take, I’ll Be Watching You: Practical StepAuth-Entication of RFID Paths
  • Kai Bu, Yingjiu Li
  • Computer Science
    IEEE Transactions on Information Forensics and Security
  • 2018
TLDR
StepAuth is presented, the first step-grained path authentication protocol that is practically efficient for authenticating products with strict path bindings and makes StepAuth practically efficient by taking advantage of nested encryption and hybrid encryption.
An Efficient Authentication Protocol for RFID-Based Supply Chains
  • Yuyin Qian, Peng Zeng
  • Computer Science, Business
    Advances in Intelligent Systems and Computing
  • 2018
TLDR
A new tag path authentication protocol for RFID-based supply chain is proposed, which further improves the efficiency of StepAuth and allows the public keys of readers to be published.

References

SHOWING 1-10 OF 25 REFERENCES
Aggregated path authentication for efficient BGP security
TLDR
This paper proposes six constructions for aggregated path authentication that substantially improve efficiency of S-BGP's path authentication on both speed and space criteria and shows that the new schemes achieve such an efficiency that they may overcome the space obstacles and provide a real-world practical solution for BGP security.
Efficient Security Mechanisms for Routing Protocolsa
TLDR
Four new mechanisms as tools for securing distance vector and path vector routing protocols, based on efficient symmetric cryptographic techniques, are presented and can be used as building blocks for securing routing protocols.
Tracker: Security and Privacy for RFID-based Supply Chains
TLDR
TRACKER allows to securely identify which (legitimate) path an object/tag has taken through a supply chain, and provides privacy: an adversary can neither learn details about an object’s path, nor can it trace and link objects in the supply chain.
Efficient Security Mechanisms for Routing Protocols
TLDR
Four new mechanisms as tools for securing distance vector and path vector routing protocols, based on efficient symmetric cryptographic techniques, are presented and can be used as building blocks for securing routing protocols.
A New Framework for Privacy of RFID Path Authentication
TLDR
A new oracle Move is introduced that models a tag's movement along a designed or an arbitrary path in a supply chain and a new privacy notion, called path privacy, is proposed, which captures the privacy of both tag identity and path information in a single game.
SECTOR: secure tracking of node encounters in multi-hop wireless networks
TLDR
SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks, is presented and it is shown that, due to their efficiency and simplicity, they are compliant with the limited resources of most mobile devices.
An efficient forward private RFID protocol
TLDR
This paper proposes a novel forward private authentication scheme built upon less computationally expensive cryptographic ingredients, namely pseudo-random generators and universal hash functions instead of one way hash functions and provides security proofs of the construction in the standard model instead of the random oracle model.
ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device
TLDR
This paper presents an ultra-lightweight RFID authentication scheme, named ULRAS, which cost less computation and communication resources and have stronger security, compared to the SASI protocol and the Gossamer protocol.
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
TLDR
This paper proposes an efficient RFID authentication scheme using elliptic curves for healthcare environments that is secure under common random oracle model and could not provide forward secrecy.
Extending the EPC network: the potential of RFID in anti-counterfeiting
TLDR
This paper proposes a solution for products requiring authentication mechanisms that go beyond track & trace, and suggests extending the upcoming EPC Network infrastructure with an EPC Product Authentication Service.
...
...