Privacy-Preserving RFID-Based Search System

被引:1
作者
Chun, Ji Young [1 ]
Noh, Geontae [1 ]
机构
[1] Seoul Cyber Univ, Dept Big Data & Informat Secur, Seoul 01133, South Korea
关键词
RFID tag search system; mobile reader; privacy; security;
D O I
10.3390/electronics10050599
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology. In particular, an RFID tag search system has been designed to find a particular tag in a group of tags using a mobile reader. Unfortunately, privacy infringement and availability issues in the search system have not been adequately addressed to date. In this paper, we propose a novel RFID tag search protocol that will enhance mobile reader user privacy while being able to operate under conditions of unstable connection to a central server. First, the proposed protocol preserves the privacy of mobile reader users. The privacy of the mobile reader user is at risk because the signal strength emitted from a mobile reader is much stronger than that from the tag, exposing the location of the mobile reader user and thus compromising the user's privacy. Thus far, such privacy issues have been overlooked. The second issue is presented because of wireless connections that are either unreliable or too remote, causing a mobile reader to disconnect from the central server. The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader. In unstable environments, the protocol can successfully locate specific tags without any server.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 23 条
[1]   S3PR:: Secure serverless search protocols for REID [J].
Ahamed, Sheikh I. ;
Rahman, Farzana ;
Hoque, Endadul ;
Kawsar, Fahim ;
Nakajima, Tatsuo .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, :187-+
[2]  
Ahamed SI, 2008, INT J SECUR APPL, V2, P57
[3]  
[Anonymous], 2008, DSTIICCPREG20079 RFI, P1
[4]  
[Anonymous], WORKING GROUP 6 MOBI
[5]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403
[6]  
Bellare M, LNCS, V1109, P1
[7]  
Burmester M, 2008, LECT NOTES COMPUT SC, V5189, P176, DOI 10.1007/978-3-540-85893-5_13
[8]   RFID tag search protocol preserving privacy of mobile reader holders [J].
Chuna, Ji Young ;
Hwang, Jung Yeon ;
Lee, Dong Hoon .
IEICE ELECTRONICS EXPRESS, 2011, 8 (02) :50-56
[9]   Strong crypto for RFID tags - A comparison of low-power hardware implementations [J].
Feldhofer, Martin ;
Wolkerstorfer, Johannes .
2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, :1839-1842
[10]   Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments [J].
Hoque, Md. Endadul ;
Rahman, Farzana ;
Ahamed, Sheikh I. ;
Park, Jong Hyuk .
WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) :65-79