Selective collision based medium access control protocol for proactive protection of privacy for RFID

被引:0
|
作者
Park, J [1 ]
Kang, J [1 ]
Nyang, D [1 ]
机构
[1] Inha Univ, Informat Secur Res Lab, Inchon, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our secure MAC protocol defines a special kind of tag called an "ownership tag". The singulation procedure is well defined only if the ownership tag is involved in the singulation process. Instead of scrambling the information of ordinary tag using the ownership tag's key information and just sending ownership tag's information in clear form, we use forced collision generated by the ownership tag to let a reader know garbage bits that are inserted in ordinary tags. Security and performance analysis for the protocol are provided.
引用
收藏
页码:383 / 392
页数:10
相关论文
共 50 条
  • [41] Proactive traffic adaptive tuning of contention window for wireless sensor network medium access control protocol
    Mouzehkesh, Nesa
    Noordin, Nor K.
    Rasid, Mohd Fadlee A.
    International Review on Computers and Software, 2010, 5 (01) : 6 - 13
  • [42] A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain
    Ma, Binhao
    Zheng, Xurui
    Zhao, Can
    Wang, Yibing
    Wang, Dejun
    Meng, Bo
    PLOS ONE, 2022, 17 (09):
  • [43] A COLLISION AWARE PRIORITY LEVEL MEDIUM ACCESS CONTROL PROTOCOL FOR UNDERWATER ACOUSTIC SENSOR NETWORKS
    Kumar, Natesan Sathish
    Kumar, Krishnan Raja
    JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA, 2020, 19 (01): : 131 - 156
  • [44] RETRACTED: Research on the access control protocol Priccess design of network privacy protection (Retracted Article)
    Ma, Xu
    Kang, Kai
    Lu, Wanshun
    Xu, Li
    Chen, Chen
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12539 - 12550
  • [45] Flexible privacy protection for RFID tags via selective identifier masking
    Lim, Tong-Lee
    Li, Tieyan
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 1570 - 1575
  • [46] Privacy protection in dynamic systems based on RFID tags
    Cichon, Jacek
    Klonowski, Marek
    Kutylowski, Miroslaw
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 235 - +
  • [47] RFID based access control protection scheme for SRAM FPGA IP cores
    Sridhar, Laavanya
    Prabha, V. Lakshmi
    MICROPROCESSORS AND MICROSYSTEMS, 2013, 37 (6-7) : 629 - 640
  • [48] An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection
    Shen, Jian
    Tan, Haowen
    Zheng, Yuhui
    Ji, Sai
    Wang, Jin
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2070 - 2079
  • [49] A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    Lim, Jihwan
    Oh, Heekuck
    Kim, Sangjin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 278 - +
  • [50] Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol
    Kapoor, Gaurav
    Piramuthu, Selwyn
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2011, 24 (07) : 1300 - 1302