Selective collision based medium access control protocol for proactive protection of privacy for RFID

被引:0
|
作者
Park, J [1 ]
Kang, J [1 ]
Nyang, D [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our secure MAC protocol defines a special kind of tag called an "ownership tag". The singulation procedure is well defined only if the ownership tag is involved in the singulation process. Instead of scrambling the information of ordinary tag using the ownership tag's key information and just sending ownership tag's information in clear form, we use forced collision generated by the ownership tag to let a reader know garbage bits that are inserted in ordinary tags. Security and performance analysis for the protocol are provided.
引用
收藏
页码:383 / 392
页数:10
相关论文
共 50 条
  • [31] Fine Grained Attribute Based Access Control Model for Privacy Protection
    Que Nguyet Tran Thi
    Tran The Si
    Tran Khanh Dang
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 305 - 316
  • [32] Integrity improvements to an RFID privacy protection protocol for anti-counterfeiting
    Zhang, XL
    King, B
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 474 - 481
  • [33] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Wei Zhang
    Sanya Liu
    Shengming Wang
    Baolin Yi
    Longkai Wu
    Wireless Personal Communications, 2017, 96 : 1215 - 1228
  • [34] Purpose based access control for privacy protection in relational database systems
    Ji-Won Byun
    Ninghui Li
    The VLDB Journal, 2008, 17 : 603 - 619
  • [35] Trust-based Access Control for Privacy Protection in Collaborative Environment
    Li, Min
    Wang, Hua
    Ross, David
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 425 - +
  • [36] A Privacy Protection Protocol For RFID-enabled Supply Chain System
    Xia, XianYao
    Han, ShuiHua
    2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 161 - +
  • [37] Purpose based access control for privacy protection in relational database systems
    Byun, Ji-Won
    Li, Ninghui
    VLDB JOURNAL, 2008, 17 (04): : 603 - 619
  • [38] Vulnerabilities in Chen and Dengs RFID mutual authentication and privacy protection protocol
    Information Systems and Operations Management, University of Florida, Gainesville, FL 32611-7169, United States
    不详
    Eng Appl Artif Intell, 7 (1300-1302):
  • [39] A Low-cost RFID Authentication Protocol with Location Privacy Protection
    Chen, Yu-Yi
    Lu, Jun-Chao
    Chen, Shin-, I
    Jan, Jinn-Ke
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 109 - +
  • [40] Powermesh Medium Access Control Protocol
    Seyedin, E.
    Lee, D. C.
    Yang, S.
    Lee, E.
    Boone, D.
    Steiner-Joyic, M.
    5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, ICSPCS'2011, 2011,