Enhancing RFID Search Protocols based on Counters

被引:0
|
作者
Lim, Jihwan [1 ]
Kim, Sangjin [2 ]
Oh, Heekuck [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Ansan 425791, Gyeonggi Do, South Korea
[2] Korea Univ, Technol & Educ Sch, Dept Internet Media, Cheonan Si 330708, Chungcheongnam, South Korea
关键词
RFID; search protocol; counter; privacy; SECURITY;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
RFID(Radio Frequency IDentification) search protocols introduced by Tan et al. are different from common RFID authentication protocols. In a search protocol, RFID reader uses a designated query to find out a desired tag. Recently, Kim et al. proposed efficient RFID search protocols using counters. Using counters to provide freshness is a novel mechanism in RFID protocols which was possible due to the fundamental characteristics of RFID search protocols. However, one demerit of their protocols is that the values of the counters are exchanged in clear which may affect the privacy of tags. In this paper, we show that the values of counters can be hidden. Moreover, we remove redundant steps from the protocols to increase the efficiency of the protocol.
引用
收藏
页码:657 / 669
页数:13
相关论文
共 50 条
  • [1] Efficient RFID Search Protocols Using Counters
    Kim, Sangjin
    Lim, Jihwan
    Han, Jaehong
    Oh, Heekuck
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (11) : 3552 - 3559
  • [2] Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments
    Md. Endadul Hoque
    Farzana Rahman
    Sheikh I. Ahamed
    Jong Hyuk Park
    [J]. Wireless Personal Communications, 2010, 55 : 65 - 79
  • [3] Secure Hash-based Search Protocols for RFID Systems
    He Jialiang
    Xu Zhiqiang
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
  • [4] Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments
    Hoque, Md. Endadul
    Rahman, Farzana
    Ahamed, Sheikh I.
    Park, Jong Hyuk
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 65 - 79
  • [5] Serverless search and authentication protocols for RFID
    Tan, Chiu C.
    Sheng, Bo
    Li, Qun
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 3 - +
  • [6] Secure and private search protocols for RFID systems
    Yanjun Zuo
    [J]. Information Systems Frontiers, 2010, 12 : 507 - 519
  • [7] Untraceable and Serverless RFID Authentication and Search Protocols
    Kim, Zeen
    Kim, Jangseong
    Kim, Kwangjo
    Choi, Imsung
    Shon, Taeshik
    [J]. 2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 278 - 283
  • [8] Secure and private search protocols for RFID systems
    Zuo, Yanjun
    [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 507 - 519
  • [9] Secure and serverless RFID authentication and search protocols
    Tan, Chin C.
    Sheng, Bo
    Li, Qun
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) : 1400 - 1407
  • [10] Lightweight Secure Search Protocols for Low-cost RFID Systems
    Kulseng, Lars
    Yu, Zhen
    Wei, Yawen
    Guan, Yong
    [J]. 2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2009, : 40 - 48