REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
نویسندگان
چکیده
1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.05.005 * Corresponding author. E-mail addresses: [email protected] (X. Lin), ca (R. Lu), [email protected] (D. Kwan), xshe (Xuemin (Sherman) Shen). In this paper, we propose an RFID-based privacy-preserving children tracking (REACT) scheme for helping locate missing children in large amusement parks and other public venues. The scheme is characterized by the cooperation among RFID readers, storage nodes and control center, which are strategically deployed across the amusement park, as well as employees and visitors in the park. When a passive RFID tag, physically attached on a child, approaches an RFID reader, the reader will process the tag information. The reader then forwards the information to a storage node through a pocket switched network formed by employees and visitors in the park. When locating a lost child is requested, the system is able to track the missing child by querying the tag information stored in the storage nodes. Detailed security analysis shows that the proposed REACT scheme achieves child’s identity privacy, unlinkable location privacy and forward security. In addition, extensive simulations demonstrate that as more visitors participate in the pocket switched network, the performance of our proposed REACT scheme increases which directly improves the efficiency for the locating lost children. 2010 Elsevier B.V. All rights reserved.
منابع مشابه
An efficient RFID mutual authentication scheme based on ECC
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملA Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID
An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 54 شماره
صفحات -
تاریخ انتشار 2010