An RFID path authentication protocol based on chebyshev polynomials

Zuming Shen, Peng Zeng*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Radio Frequency Identification (RFID) technology has a wild range of applications in the industrial supply-chain. In particular an RFID path authentication protocol can be used to detect whether the products labeled with RFID tags have passed a complete and valid path and whether any counterfeit products have entered our supply system. In this paper, we first apply Chebyshev polynomials to RFID path authentication protocol in the supply chain. Our proposed protocol not only satisfies the three well-known security requirements (the privacy, path unlinkability and tag unlinkability), but also provides a simple identity authentication protocol between readers and tags. Further the states of tags are allowed to be exposed due to the use of Chebyshev polynomials. Compared with other related protocols, our proposed protocol reduces the calculation time and has a lower memory requirement of tags.

Original languageEnglish
Title of host publicationInternational Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 - Applications and Techniques in Cyber Security and Intelligence
EditorsMohammed Atiquzzaman, Zheng Xu, Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
PublisherSpringer Verlag
Pages17-27
Number of pages11
ISBN (Print)9783319987750
DOIs
StatePublished - 2019
EventInternational Conference on Applications and Techniques in Cyber Intelligence, ATCI 2018 - Shanghai, China
Duration: 11 Jul 201813 Jul 2018

Publication series

NameAdvances in Intelligent Systems and Computing
Volume842
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Applications and Techniques in Cyber Intelligence, ATCI 2018
Country/TerritoryChina
CityShanghai
Period11/07/1813/07/18

Keywords

  • Chebyshev polynomials
  • Cryptography protocol
  • Data security
  • Path authentication
  • RFID

Fingerprint

Dive into the research topics of 'An RFID path authentication protocol based on chebyshev polynomials'. Together they form a unique fingerprint.

Cite this