Authorized Tracking and Tracing for RFID Tags
نویسندگان
چکیده
Radio Frequency Identification (RFID) systems have become popular for identifying not only objects but also persons. For example, in supply chain applications, the company can constantly track the movements of goods. Also, for Body Area Network or Personal Area Work, the tag is used for identifying a person. However, the movements and current locations of goods and a person’s activity profiles are the sensitive information and should be kept secret. This paper develops the interaction protocols between readers and tags to address this privacy issue of protecting tagged objects from tracking and tracing by non-authorized readers.
منابع مشابه
Multi-domain Rfid Access Control Using Asymmetric Key Based Tag-reader Mutual Authentication
Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications depends on their ability to enforce ...
متن کاملA Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID
An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic ...
متن کاملPrivacy-Preserving Authorized RFID Authentication Protocols
Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by...
متن کاملReordering of Location Identifiers for Indexing an RFID Tag Object Database
Radio frequency identification (RFID) has become one of the emerging technologies for a wide area of applications such as automated manufacturing, inventory tracking, and supply chain management. RF technologies make it possible to identify individual items in realtime by means of automatic and fast identification. Besides the real-time identification, RF technologies give additional advantages...
متن کاملPrivacy Enhancing Techniques on RFID systems
An RFID system is a tracking and tracing system, and is useful for the management of various items and animals in a supply chain, animal husbandry and so on. According to a Japanese investigation firm, the number of RFID tags in Japan will increase rapidly from 51 million in 2007 to 1.7 billion in 2012 (Yano Research Institute, 2008). In RFID systems, RFID tags, which have unique IDs, are attac...
متن کامل