Tagora: A Collision-Exploitative RFID Authentication Protocol Based on Cross-Layer Approach
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Hoorin | - |
dc.contributor.author | Roh, Heejun | - |
dc.contributor.author | Lee, Wonjun | - |
dc.date.accessioned | 2021-08-31T04:52:46Z | - |
dc.date.available | 2021-08-31T04:52:46Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-04 | - |
dc.identifier.issn | 2327-4662 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/56810 | - |
dc.description.abstract | Radio-frequency identification (RFID) system, successfully adopted in many industrial applications, suffers from security issues due to the inherent weakness of wireless communication, such as eavesdropping, replay attack, impersonation attack, and traceability issues. A lot of research efforts based on cryptographic primitives have been conducted in a decade, however, most of the existing security protocols depending on cryptosystems are not feasible to be applied due to the minimalist design of passive tags. A lightweight cryptographic authentication is one of the practical solutions, but it has traceability issues from physical layer information. The other approach is to use the properties of the physical layer of RFID systems. However, since the physical-layer characteristics cannot be intentionally updated, they are vulnerable to situations where an adversary actively obtains authentic data for traceability attacks or replay attacks. Therefore, to resist the security threats, we propose Tagora, a cross-layer authentication protocol, which is the first integration work of two-layer approaches that harness the unpredictable properties of tag's collision responses at both the physical and application layers. Our protocol design is composed of a collision recovery algorithm with a random offset scheme and phase encryption in the physical layer, and authentication process based on a challenge-response mechanism in the application layer. We evaluate Tagora in terms of the untraceability and reliability, and also provide security analysis on how Tagora can defend against plausible attacks while meeting security requirements. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | LIGHTWEIGHT | - |
dc.subject | PRIVACY | - |
dc.subject | SECURITY | - |
dc.subject | SYSTEMS | - |
dc.subject | READER | - |
dc.title | Tagora: A Collision-Exploitative RFID Authentication Protocol Based on Cross-Layer Approach | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Roh, Heejun | - |
dc.contributor.affiliatedAuthor | Lee, Wonjun | - |
dc.identifier.doi | 10.1109/JIOT.2020.2972915 | - |
dc.identifier.scopusid | 2-s2.0-85083694330 | - |
dc.identifier.wosid | 000537136400088 | - |
dc.identifier.bibliographicCitation | IEEE INTERNET OF THINGS JOURNAL, v.7, no.4, pp.3571 - 3585 | - |
dc.relation.isPartOf | IEEE INTERNET OF THINGS JOURNAL | - |
dc.citation.title | IEEE INTERNET OF THINGS JOURNAL | - |
dc.citation.volume | 7 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 3571 | - |
dc.citation.endPage | 3585 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | LIGHTWEIGHT | - |
dc.subject.keywordPlus | PRIVACY | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordPlus | SYSTEMS | - |
dc.subject.keywordPlus | READER | - |
dc.subject.keywordAuthor | Authentication protocol | - |
dc.subject.keywordAuthor | backscatter communication | - |
dc.subject.keywordAuthor | multitag | - |
dc.subject.keywordAuthor | radio-frequency identification (RFID) system | - |
dc.subject.keywordAuthor | wireless security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.