A hybrid approach for privacy-preserving RFID tags

被引:11
作者
Ryu, Eun-Kyung [1 ]
Takagi, Tsuyoshi [2 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
[2] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido 0418655, Japan
关键词
RFID; Privacy; Security; Authentication; Identification; UNIVERSAL RE-ENCRYPTION;
D O I
10.1016/j.csi.2008.09.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there have been a considerable amount of works for privacy-preserving RAID tags. However, most existing schemes have a common, inherent problem in the fact that in order to identify only one single tag they require a linear computational complexity on the system side. This problem makes use of the schemes impractical in large-scale RFID deployments. We propose a new scheme for privacy-preserving RFID tags which combines the classical challenge-response mechanism with the idea of one-time pads in a simple but practical way. Our technique has a number of crucial advantages. It supports mutual authentication between reader and tag. It also supports untraceability with no information leakage. Furthermore, the scheme we present requires only one cryptographic operation to identify one device among N, which is an important benefit in large-scale RFID systems. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:812 / 815
页数:4
相关论文
共 17 条
  • [1] Ateniese G., 2005, Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), P92, DOI DOI 10.1145/1102120.1102134.19
  • [2] A scalable and provably secure hash-based RFID protocol
    Avoine, G
    Oechslin, P
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
  • [3] A lightweight RFID protocol to protect against traceability and cloning attacks
    Dimitriou, T
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 59 - 66
  • [4] *EPCGLOBAL, SEPC RFID AIR INT
  • [5] Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
  • [6] Golle P, 2004, LECT NOTES COMPUT SC, V2964, P163
  • [7] Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
  • [8] *ISO IEC, 8000 ISOIEC
  • [9] RFID security and privacy: A research survey
    Juels, A
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 381 - 394
  • [10] JUELS A, 2004, LECT NOTES COMPUTER, V3352, P149, DOI DOI 10.1007/B105083