A Novel Coding Scheme for Secure Communications in Distributed RFID Systems

被引:7
作者
Sakai, Kazuya [1 ]
Sun, Min-Te [2 ]
Ku, Wei-Shinn [3 ]
Lai, Ten H. [4 ]
机构
[1] Tokyo Metropolitan Univ, Dept Informat & Commun Syst, 6-6 Asahigaoka, Hino, Tokyo 1910065, Japan
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[3] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[4] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
关键词
RFID security; privacy; coding; BACKWARD CHANNEL PROTECTION;
D O I
10.1109/TC.2015.2423671
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy protection is the primary concern when RFID applications are deployed in our daily lives. Due to the computational power constraints of passive tags, non-encryption-based singulation protocols have been recently developed, in which wireless jamming is used. However, the existing private tag access protocols without shared secrets rely on impractical physical layer assumptions, and thus they are difficult to deploy. To tackle this issue, we first redesign the architecture of RFID system by dividing an RF reader into two different devices, an RF activator and a trusted shield device (TSD). Then, we propose a novel coding scheme, namely Random Flipping Random Jamming (RFRJ), to protect tags' content. Unlike the past work, the proposed singulation protocol utilizes only the physical layer techniques that are already implemented. Analyses and simulation results validate our distributed architecture with the RFRJ coding scheme, which defends tags' privacy against various adversaries including the random guessing attack, correlation attack, ghost-and-leech attack, and eavesdropping.
引用
收藏
页码:409 / 421
页数:13
相关论文
共 21 条
[1]  
[Anonymous], 2007, Proceedings of the 2nd ACM symposium on Information, computer and communications security
[2]   Backward channel protection based on randomized tree-walking algorithm and its analysis for securing RFID tag information and privacy [J].
Choi, Wonjoon ;
Yoon, Myungchul ;
Roh, Byeong-hee .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (01) :172-182
[3]   Design of a RFID case-based resource management system for warehouse operations [J].
Chow, HKH ;
Choy, KL ;
Lee, WB ;
Lau, KC .
EXPERT SYSTEMS WITH APPLICATIONS, 2006, 30 (04) :561-576
[4]  
Czeskis A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P479
[5]  
De Donno D, 2010, MOBICOM 10 & MOBIHOC 10: PROCEEDINGS OF THE 16TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING AND THE 11TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P97
[6]  
Delfs H., 2007, Introduction to cryptography: principles and applications
[7]   They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices [J].
Gollakota, Shyamnath ;
Hassanieh, Haitham ;
Ransford, Benjamin ;
Katabi, Dina ;
Fu, Kevin .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) :2-13
[8]  
Hoque ME, 2011, INT CONF PERVAS COMP, P102, DOI 10.1109/PERCOM.2011.5767573
[9]  
Jain M., 2011, Proc. 17th Annual. Int. Conf. Mob. Comput. Netw. MobiCom '11, P301, DOI DOI 10.1145/2030613.2030647
[10]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394