Selective collision based medium access control protocol for proactive protection of privacy for RFID

被引:0
|
作者
Park, J [1 ]
Kang, J [1 ]
Nyang, D [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our secure MAC protocol defines a special kind of tag called an "ownership tag". The singulation procedure is well defined only if the ownership tag is involved in the singulation process. Instead of scrambling the information of ordinary tag using the ownership tag's key information and just sending ownership tag's information in clear form, we use forced collision generated by the ownership tag to let a reader know garbage bits that are inserted in ordinary tags. Security and performance analysis for the protocol are provided.
引用
收藏
页码:383 / 392
页数:10
相关论文
共 50 条
  • [1] Privacy Protection Method Based on Access Control
    Qiao, Xin
    Wang, Lixiaoyang
    Qin, Bo
    Chen, Hong
    Zhao, Suyun
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 254 - 259
  • [2] An Improvement on RFID Authentication Protocol with Privacy Protection
    Lee, Y. -C.
    Hsieh, Y. -C.
    You, P-S.
    Chen, T. -C.
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 569 - +
  • [3] An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
    Zhu, Hongfeng
    Zhang, Yan
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1777 - 1787
  • [4] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [5] Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol
    Fan, Kai
    Wang, Wei
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [6] A Distributed Binary Tree Protocol for Medium Access Control in RFID Systems
    Baldi, Marco
    Morichetti, Stefano
    Gambi, Ennio
    2008 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2008, : 226 - 230
  • [7] U-MAC: a proactive and adaptive UWB medium access control protocol
    Jurdak, R
    Baldi, P
    Lopes, CV
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2005, 5 (05): : 551 - 566
  • [9] An Anti-Counterfeiting RFID Privacy Protection Protocol
    Xiaolan Zhang
    Brian King
    Journal of Computer Science and Technology, 2007, 22 : 438 - 448
  • [10] An anti-counterfeiting RFID privacy protection protocol
    Zhang, Xiaolan
    King, Brian
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (03) : 438 - 448