Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification

被引:30
作者
Alomair, Basel [1 ]
Clark, Andrew [2 ]
Cuellar, Jorge [3 ]
Poovendran, Radha [2 ]
机构
[1] KACST, CRI, Riyadh 11442, Saudi Arabia
[2] Univ Washington, Dept Elect Engn, Seattle, WA 98195 USA
[3] CERT, Corp Res & Technol, CT T DE IT1, D-81739 Munich, Germany
关键词
RFID; privacy; authentication; identification; scalability;
D O I
10.1109/TPDS.2011.290
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In RFID literature, most "privacy-preserving" protocols require the reader to search all tags in the system in order to identify a single tag. In another class of protocols, the search complexity is reduced to be logarithmic in the number of tags, but it comes with two major drawbacks: it requires a large communication overhead over the fragile wireless channel, and the compromise of a tag in the system reveals secret information about other, uncompromised, tags in the same system. In this work, we take a different approach to address time complexity of private identification in large-scale RFID systems. We utilize the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFID systems with constant-time identification. Instead of increasing communication overhead, the existence of a large storage device in RFID systems, the database, is utilized for improving the time efficiency of tag identification.
引用
收藏
页码:1536 / 1550
页数:15
相关论文
共 42 条
[21]  
Juels A, 2005, LECT NOTES COMPUT SC, V3352, P149
[22]   Defining strong privacy for RFID (Extended abstract) [J].
Juels, Ari ;
Weis, Stephen A. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :342-+
[23]  
Kavun EB, 2010, LECT NOTES COMPUT SC, V6370, P258, DOI 10.1007/978-3-642-16822-2_20
[24]   ASAP: A MAC protocol for dense and time-constrained RFID systems [J].
Khandelwal, Girish ;
Lee, Kyounghwan ;
Yener, Aylin ;
Serbetli, Semih .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2007, 2007 (1)
[25]  
Kodialam M, 2006, MOBICOM 2006, P322
[26]  
Lim TL, 2009, LECT NOTES COMPUT SC, V5487, P406, DOI 10.1007/978-3-642-01440-6_30
[27]  
Lu L., 2010, Proc. of IEEE INFOCOM, P1
[28]   Dynamic key-updating: Privacy-preserving authentication for RFID systems [J].
Lu, Li ;
Han, Jinsong ;
Hu, Lei ;
Liu, Yunhao ;
Ni, Lionel M. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, :13-+
[29]   ACTION: Breaking the Privacy Barrier for RFID Systems [J].
Lu, Li ;
Han, Jinsong ;
Xiao, Renyi ;
Liu, Yunhao .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :1953-1961
[30]  
Ma CS, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P54