Premium
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti‐tracking in 5G
Author(s) -
Yin Xi,
Fang Binxing,
Jin Shuyuan,
Qiu Meikang,
Vasilakos Athanasios V.,
Xu Yongjun
Publication year - 2015
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.2960
Subject(s) - computer science , denial of service attack , hash function , computer network , authentication protocol , authentication (law) , computer security , mutual authentication , protocol (science) , radio frequency identification , hash chain , identification (biology) , world wide web , the internet , medicine , botany , alternative medicine , pathology , biology
Summary In the fifth generation mobile networks (in short, 5G), radio frequency identification (RFID) tags are embedded in a growing number of personal items, especially in smartphones. The RFID authentication protocols in 5G should be anti‐scanning and privacy‐enhancing, because RFID tags in smartphones often suffer from leaking private trace of mobile users. However, majorities of existing RFID protocols are vulnerable to location‐tracking threats, and to distributed denial of service (DDoS) attacks on back‐end servers. To eliminate these threats, we propose a hash‐based mutual authentication protocol for smartphones in 5G. This protocol protects individuals' location privacy against malicious hidden scanning in public places. By the authentication of RFID readers via hash values, the proposed protocol is robust against the aforementioned threats. Additionally, our authentication efficiency on the tag side is 2H (two hash calculations), which outperforms most of previously reported solutions based on hash, and the tag stores only two vectors (one is k ‐bit and the other j ‐bit). Copyright © 2015 John Wiley & Sons, Ltd.