Privacy versus scalability in radio frequency identification systems
نویسندگان
چکیده
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-of-sight path. One of the main challenges for the successful commercialization of the RFID technology is the efficient, yet private, identification of low-cost tags in the presence of adversaries attempting to illegally track users via tags in their possession. An RFID system consists of two functional components, namely, the interactive protocol between RFID reader-tag pairs and the reader-database information retrieval mechanism. Because of the large number of tags in a typical RFID system, the private identification of tags can be a challenging problem. In this paper, we investigate privacy-preserving RFID systems and classify them based on the computational efficiency of tag identification. We show the close relation between the degree of privacy achieved by the reader-tag interaction and the reader-database information retrieval complexity.
منابع مشابه
An elliptic curve and zero knowledge based forward secure RFID Protocol
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores, has been increased. Nevertheless, some of this systems have privacy problems that may discourage potential users. Hence, secure and efficient privacy protocols are urgently needed. Previous works in the literature proposed schemes that were proven to be secure, but they had scalability problems. A feasibl...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملProtecting Privacy and Ensuring Security of RFID Systems Using Private Authentication Protocols
PROTECTING PRIVACY AND ENSURING SECURITY OF RFID SYSTEMS USING PRIVATE AUTHENTICATION PROTOCOLS Md. Endadul Hoque Marquette University, 2010 Radio Frequency IDentification (RFID) systems have been studied as an emerging technology for automatic identification of objects and assets in various applications ranging from inventory tracking to point of sale applications and from healthcare applicati...
متن کاملYet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol
Radio Frequency IDentification (RFID) systems are gaining enormous interests in industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more important concern in the RFID system because of pervasiveness of RFID ta...
متن کاملA distributed architecture for scalable private RFID tag identification
The fast growth of Radio Frequency IDentification (RFID) implies a deployment challenge, namely how to keep this technology scalable without renouncing security and privacy features. This paper focuses on combining tag privacy and scalability using the hash locks mechanism. Our contribution is twofold: (i) a cell-based architecture is proposed in which the readers co-operate in order to conduct...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 33 شماره
صفحات -
تاریخ انتشار 2010