Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G

Publisher:
WILEY
Publication Type:
Journal Article
Citation:
International Journal of Communication Systems, 2016, 29, (16), pp. 2375-2387
Issue Date:
2016-11-10
Filename Description Size
ContentServer (18).pdfPublished version334.32 kB
Adobe PDF
Full metadata record
In the fifth generation mobile networks (in short, 5G), radio frequency identification (RFID) tags are embedded in a growing number of personal items, especially in smartphones. The RFID authentication protocols in 5G should be anti-scanning and privacy-enhancing, because RFID tags in smartphones often suffer from leaking private trace of mobile users. However, majorities of existing RFID protocols are vulnerable to location-tracking threats, and to distributed denial of service (DDoS) attacks on back-end servers. To eliminate these threats, we propose a hash-based mutual authentication protocol for smartphones in 5G. This protocol protects individuals' location privacy against malicious hidden scanning in public places. By the authentication of RFID readers via hash values, the proposed protocol is robust against the aforementioned threats. Additionally, our authentication efficiency on the tag side is 2H (two hash calculations), which outperforms most of previously reported solutions based on hash, and the tag stores only two vectors (one is k-bit and the other j-bit). Copyright © 2015 John Wiley & Sons, Ltd.
Please use this identifier to cite or link to this item: