RFID seeking: Finding a lost tag rather than only detecting its missing

نویسندگان

  • Wei Xie
  • Lei Xie
  • Chen Zhang
  • Qiang Wang
  • Jian Xu
  • Quan Zhang
  • Chaojing Tang
چکیده

This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for RFID seeking scenarios, in which a user is to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones. In this paper, detailed requirements for RFID seeking are suggested. The first secure RFID seeking protocol is proposed, meeting all the given requirements. Its security is formally verified by using the AVISPA tool. The proposed protocol is server-less, lightweight, privacy-friendly to both RFID readers and tags, and is secure against common attacks such as eavesdropping, manipulating, replaying, tracing, Denial of Service (DoS), etc. & 2014 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Ultra-lightweight RFID Seeking Protocol for Low-cost Tags

RFID systems are widely used in various applications, and attaching RFID tags to objects are increasing. Recently, Xie et al. defined RFID seeking concept which is finding a lost tag in a blind spot or a specified tag among lots of similar ones and proposed a lightweight RFID seeking protocol. Their protocol provides security and privacy against most of common malicious attacks. However, since ...

متن کامل

A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems

Frame slotted ALOHA (FSA) protocol is a classic tag anti-collision protocol. Similar to most existing anti-collision protocols, The FSA initially aims at tag identification of static scenarios, that is, all tags keep still during the tag identification process. However, in many real scenarios, tags generally move along a fixed path in the reader coverage area, that is, tags stay the coverage ar...

متن کامل

REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks

1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.05.005 * Corresponding author. E-mail addresses: [email protected] (X. Lin), ca (R. Lu), [email protected] (D. Kwan), xshe (Xuemin (Sherman) Shen). In this paper, we propose an RFID-based privacy-preserving children tracking (REACT) scheme for helping locate missing children in large amusement parks and other public ven...

متن کامل

Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer

RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designin...

متن کامل

Load-aware Reader Placement Algorithms for RFID Networks

Radio Frequency Identification (RFID) technology has been used in a wide variety of tracking, monitoring, and access control applications. The spreading adoption of RFID and its large scale deployments have given importance to some planning and coverage problems in this field. Tags coverage in RFID networks is one of these problems that can be defined generally as finding the number and locatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 42  شماره 

صفحات  -

تاریخ انتشار 2014