RFID seeking: Finding a lost tag rather than only detecting its missing

被引:12
作者
Xie, Wei [1 ]
Xie, Lei [2 ]
Zhang, Chen [1 ]
Wang, Qiang [3 ]
Xu, Jian [4 ]
Zhang, Quan [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha, Hunan, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
[3] Swiss Fed Inst Technol, Sch Commun & Comp Sci, CH-1015 Lausanne, Switzerland
[4] Univ Illinois, Dept Elect & Comp Engn, Chicago, IL 60680 USA
基金
中国国家自然科学基金;
关键词
RFID; Server-less; Searching; Security; Privacy; AUTHENTICATION; PRIVACY; SECURITY; PROTOCOL; READER; LOCALIZATION; SYSTEMS; DESIGN;
D O I
10.1016/j.jnca.2014.01.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for RFID seeking scenarios, in which a user is to find a lost tagged item in a blind spot, or to find a wanted item among a mass of similar ones. In this paper, detailed requirements for RFID seeking are suggested. The first secure RFID seeking protocol is proposed, meeting all the given requirements. Its security is formally verified by using the AVISPA tool. The proposed protocol is server-less, lightweight, privacy-friendly to both RFID readers and tags, and is secure against common attacks such as eavesdropping, manipulating, replaying, tracing, Denial of Service (DoS), etc. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 40 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], 2005, P APPSEM 2005 WORKSH
[3]   Privacy-friendly synchronized ultralightweight authentication protocols in the storm [J].
Avoine, Gildas ;
Carpent, Xavier ;
Martin, Benjamin .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) :826-843
[4]   Efficient Misplaced-Tag Pinpointing in Large RFID Systems [J].
Bu, Kai ;
Xiao, Bin ;
Xiao, Qingjun ;
Chen, Shigang .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) :2094-2106
[5]   On the Design and Deployment of RFID Assisted Navigation Systems for VANETs [J].
Cheng, Wei ;
Cheng, Xiuzhen ;
Song, Min ;
Chen, Biao ;
Zhao, Wendy W. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (07) :1267-1274
[6]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[7]   RFID tag search protocol preserving privacy of mobile reader holders [J].
Chuna, Ji Young ;
Hwang, Jung Yeon ;
Lee, Dong Hoon .
IEICE ELECTRONICS EXPRESS, 2011, 8 (02) :50-56
[8]  
Cunqing Ma, 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P185, DOI 10.1109/TrustCom.2012.141
[9]   An optimal probabilistic solution for information confinement, privacy, and security in RFID systems [J].
Di Pietro, Roberto ;
Molva, Refik .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) :853-863
[10]   Mobile Robot Localization Using the Phase of Passive UHF RFID Signals [J].
DiGiampaolo, Emidio ;
Martinelli, Francesco .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2014, 61 (01) :365-376