Privacy-Preserving RFID-Based Search System

被引:1
作者
Chun, Ji Young [1 ]
Noh, Geontae [1 ]
机构
[1] Seoul Cyber Univ, Dept Big Data & Informat Secur, Seoul 01133, South Korea
关键词
RFID tag search system; mobile reader; privacy; security;
D O I
10.3390/electronics10050599
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology. In particular, an RFID tag search system has been designed to find a particular tag in a group of tags using a mobile reader. Unfortunately, privacy infringement and availability issues in the search system have not been adequately addressed to date. In this paper, we propose a novel RFID tag search protocol that will enhance mobile reader user privacy while being able to operate under conditions of unstable connection to a central server. First, the proposed protocol preserves the privacy of mobile reader users. The privacy of the mobile reader user is at risk because the signal strength emitted from a mobile reader is much stronger than that from the tag, exposing the location of the mobile reader user and thus compromising the user's privacy. Thus far, such privacy issues have been overlooked. The second issue is presented because of wireless connections that are either unreliable or too remote, causing a mobile reader to disconnect from the central server. The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader. In unstable environments, the protocol can successfully locate specific tags without any server.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 23 条
[11]  
Ji Young Chun, 2011, Advanced Radio Frequency Identification Design and Applications, P173
[12]  
Juels, 2005, Advances in Cryptology-CRYPTO '05, Lecture Notes in Computer Science, P293, DOI 10.1007/11535218
[13]  
Karygiannis T, 2007, US NATL I STANDARDS
[14]  
Katz J., 2007, Introduction to Modern Cryptography: Principles and Protocols
[15]   Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers [J].
Mtita, Collins ;
Laurent, Maryline ;
Delort, Jacques .
IET INFORMATION SECURITY, 2016, 10 (05) :262-271
[16]  
Ohkubo M., P RFID PRIV WORKSH C
[17]  
Paise R, P 2008 ACM S INF COM, P292
[18]  
Sotto J, 2000, RANDOMNESS TESTING A
[19]   Secure and serverless RFID authentication and search protocols [J].
Tan, Chin C. ;
Sheng, Bo ;
Li, Qun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) :1400-1407
[20]   Serverless search and authentication protocols for RFID [J].
Tan, Chiu C. ;
Sheng, Bo ;
Li, Qun .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, :3-+