Tamper Detection in RFID Tags Using Zero-watermarks

被引:0
作者
Yao, Xiaoming [1 ]
Chen, Hongyu [1 ]
Li, Honglei [1 ]
Zhou, Xiaoyi [1 ]
机构
[1] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Peoples R China
来源
SENSORS, MECHATRONICS AND AUTOMATION | 2014年 / 511-512卷
关键词
RFID Security; Tamper Detection; Zero-watermark; RFID Tags;
D O I
10.4028/www.scientific.net/AMM.511-512.169
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently data integrity issues of applications based on radio frequency identification (RFID) have drawn great concerns worldwide and many watermarking-based schemes have been proposed. While those schemes can effectively verify if the protected tag data be modified, they also expose both the protected data and the watermark to any adversaries. In this paper, we present a zero-watermark scheme, which stores the watermark not in part of the data fields of RFID tags but in the back-end database system or that of a trusted third party without any modification of the original RFID data. The novelty of this zero-watermark scheme lies in the fact that we extend the zero-watermark technology to the RFID tags and the use of data tampering from the limited applications of copyright protection of digital works. We term this scheme ZMark-TamDetect because it is a tamper detection solution using zero-watermarks, which is so designed that it can be easily plugged into existing RFID middleware applications. This proposal is one of the first works that integrates zero-watermark and RFID technologies together and it provides a detailed theoretical foundation for the ZMark-TamDetect.
引用
收藏
页码:169 / 172
页数:4
相关论文
共 11 条
  • [1] [Anonymous], 2006, 180006 ISOIEC
  • [2] [Anonymous], 2008, EPC radio-frequency identity protocols generation-2 UHF RFID
  • [3] [Anonymous], 2007, REP RAT EN US FISC 2
  • [4] Curran K., 2011, INT J ENG TECHNOLOGY, P27, DOI 1
  • [5] FAN MQ, 2009, P INT C NETW SEC WIR, P147
  • [6] Tamper Detection in the EPC Network Using Digital Watermarking
    Han, ShuiHua
    Chu, Chao-Hsien
    Luo, Zongwei
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 62 - 69
  • [7] Noman Ali Nur Mohammad, 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2010), P98, DOI 10.1109/IIHMSP.2010.32
  • [8] Potdar V, 2005, LECT NOTES ARTIF INT, V3802, P273
  • [9] Potdar V., 2006, 10 IEEE INT C IND TE
  • [10] SUZUKI S, 2006, AEROIDCAM007 AUT ID