Predictive protocol for the scalable identification of RFID tags through collaborative readers
نویسندگان
چکیده
Radio frequency identification (RFID) is a technology aimed at efficiently identifying products that has greatly influenced the manufacturing businesses in recent years. Although the RFID technology has been widely accepted by the manufacturing and retailing sectors, there are still many issues regarding its scalability, security and privacy. With regard to privacy, the sharing of identification information amongst multiple parties is also an issue (especially after the massive outsourcing that is taking place in our global market). Securely and efficiently sharing identification information with multiple parties is a tough problem that must be considered so as to avert the undesired disclosure of confidential information. Specially in the context of supply chain management. In this article, we propose a private and scalable protocol for RFID collaborative readers to securely identify RFID tags. We define the general concepts of “next reader predictor” (NRP) and “previous reader predictor” (PRP) used by the readers to predict the trajectories of tags and collaborate efficiently. We also propose a specific Markov-based predictor implementation. By the very nature of our distributed protocol, the collaborative readers can naturally help in mitigating the problem of sharing identification information amongst multiple parties securely, which is essential in the context of supply chain management. The experimental results show that our proposal outperforms previous approaches.
منابع مشابه
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
There is a need for efficient communication protocols that allow the private and scalable deployment of RFID systems with a large number of tags. In this paper, we leverage the idea of using distributed, collaborative readers to identify RFID tags and propose a new probabilistic communication protocol for those readers to privately identify RFID tags more efficiently in terms of computational c...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملA Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate reading device (reader) collecting information about him. To solve these issues, many RFID privacy protecting protocols assume that readers have continuous connectivity with a centralised on-line database in charge of the i...
متن کاملA Scalable, Privacy-Preserving and Secure RFID Protocol
In this paper we propose a communication protocol for Radio Frequency Identification (RFID) systems that is based on the tags responding only to authenticated readers, otherwise tags always maintain RF silence. The protocol is practical from a deployment point of view and it not only meets the formal definitions of strong privacy and untraceability, but also addresses most, of the concerns rais...
متن کاملA Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the tag attached to it, changes hands during the course of its lifetime. After such an ownership transfer, the new owner should be able to read the tag but the old owner should not. We address these issues through an RFID pse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers in Industry
دوره 63 شماره
صفحات -
تاریخ انتشار 2012