Protect Mobile RFID Location Privacy Using Dynamic Identity

被引:0
|
作者
Yang, Ming Hour [1 ]
Wu, Jain-Shing [2 ]
Chen, Shih-Jen [2 ]
机构
[1] Chung Yuan Christian Univ, Chungli, Taiwan
[2] Inst Informat Ind, Networks & Multimedia Inst, Taipei, Taiwan
来源
PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS | 2008年
关键词
RFID; GNY logic; replay attack;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To protect data and location privacy of an RFID user, the transmitted sensitive information of RIFD tags must be encrypted and unpredictable. The previous approaches to protect user privacy for RFID are classified into authentication-based schemes, encryption-based schemes, and dynamic identity schemes. However, authentication-based schemes are easily broken. Because low-cost MD tags are not tamper-resistant, the key for the authentication protocol cannot be well protected. Encryption-based schemes can protect data privacy but location privacy is still vulnerable due to fixed cipertext. Although dynamic identity schemes have chance to overcome the previous problems, but dynamic identity schemes are limited by exhaustive search problem. And, the cost of RFID tags is very limited. In this paper, we proposed a lightweight dynamic identity based RFID authentication scheme to protect both data privacy and location privacy. And we use the GAY logic analysis to show the proposed scheme can against threats Of replay attacks, spoofing, man-in-the-middle, and message loss.
引用
收藏
页码:366 / +
页数:3
相关论文
共 50 条
  • [1] Protect of MMS Message in Mobile Phone using Dynamic Location
    Hamad, Hatem
    ELKourd, Souhir
    2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), 2012, : 522 - 531
  • [2] Using Dynamic Pseudo-IDs to Protect Privacy in Location-Based Services
    Zhu, Xiaoyan
    Chi, Haotian
    Jiang, Shunrong
    Lei, Xiaosan
    Li, Hui
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2307 - 2312
  • [3] PROVIDING LOCATION PRIVACY PROTECTION USING DYNAMIC GRID SYSTEM FOR MOBILE LOCATION BASED SERVICES
    Saravanan, G.
    Sundaramurthy, G.
    Sanjay, R.
    Geetha, R.
    2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [4] USING SMART CARD IN RFID INFRASTRUCTURE TO PROTECT CONSUMER PRIVACY
    Lu, Mi-Cheng
    Ku, Cheng-Yuan
    Hwang, Lain-Chyr
    Chao, Hui-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (04): : 1777 - 1788
  • [5] Location privacy in RFID applications
    Sadeghi, Ahmad-Reza
    Visconti, Ivan
    Wachsmann, Christian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, 5599 : 127 - 150
  • [6] Location Privacy in RFID Applications
    Sadeghi, Ahmad-Reza
    Visconti, Ivan
    Wachsmann, Christian
    PRIVACY IN LOCATION-BASED APPLICATIONS: RESEARCH ISSUES AND EMERGING TRENDS, 2009, 5599 : 127 - +
  • [7] A Study on RFID Privacy Mechanism using Mobile Phone
    Lee, Haedong
    Choi, Dooho
    Lee, Sokjoon
    Kim, Howon
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 75 - 78
  • [8] Protect privacy of mobile data
    Caroline O. Buckee
    Nature, 2014, 514 : 35 - 35
  • [9] Protect privacy of mobile data
    Buckee, Caroline O.
    NATURE, 2014, 514 (7520) : 35 - 35
  • [10] Clipped RFID Tags Protect Consumer Privacy
    Karjoth, Gunter
    Moskowitz, Paul
    ERCIM NEWS, 2007, (68): : 47 - 48