REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks

نویسندگان

  • Xiaodong Lin
  • Rongxing Lu
  • Davis Kwan
  • Xuemin Shen
چکیده

1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.05.005 * Corresponding author. E-mail addresses: [email protected] (X. Lin), ca (R. Lu), [email protected] (D. Kwan), xshe (Xuemin (Sherman) Shen). In this paper, we propose an RFID-based privacy-preserving children tracking (REACT) scheme for helping locate missing children in large amusement parks and other public venues. The scheme is characterized by the cooperation among RFID readers, storage nodes and control center, which are strategically deployed across the amusement park, as well as employees and visitors in the park. When a passive RFID tag, physically attached on a child, approaches an RFID reader, the reader will process the tag information. The reader then forwards the information to a storage node through a pocket switched network formed by employees and visitors in the park. When locating a lost child is requested, the system is able to track the missing child by querying the tag information stored in the storage nodes. Detailed security analysis shows that the proposed REACT scheme achieves child’s identity privacy, unlinkable location privacy and forward security. In addition, extensive simulations demonstrate that as more visitors participate in the pocket switched network, the performance of our proposed REACT scheme increases which directly improves the efficiency for the locating lost children. 2010 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient RFID mutual authentication scheme based on ECC

Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID

An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 54  شماره 

صفحات  -

تاریخ انتشار 2010