Enhancing RFID Search Protocols based on Counters

被引:0
|
作者
Lim, Jihwan [1 ]
Kim, Sangjin [2 ]
Oh, Heekuck [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Ansan 425791, Gyeonggi Do, South Korea
[2] Korea Univ, Technol & Educ Sch, Dept Internet Media, Cheonan Si 330708, Chungcheongnam, South Korea
关键词
RFID; search protocol; counter; privacy; SECURITY;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
RFID(Radio Frequency IDentification) search protocols introduced by Tan et al. are different from common RFID authentication protocols. In a search protocol, RFID reader uses a designated query to find out a desired tag. Recently, Kim et al. proposed efficient RFID search protocols using counters. Using counters to provide freshness is a novel mechanism in RFID protocols which was possible due to the fundamental characteristics of RFID search protocols. However, one demerit of their protocols is that the values of the counters are exchanged in clear which may affect the privacy of tags. In this paper, we show that the values of counters can be hidden. Moreover, we remove redundant steps from the protocols to increase the efficiency of the protocol.
引用
收藏
页码:657 / 669
页数:13
相关论文
共 50 条
  • [21] Review on RFID Identity Authentication Protocols Based on Hash Function
    Yang Bing
    Liu Baolong
    Chen Hua
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27
  • [22] Analytic Hierarchy Process Based Compatibility Measurement for RFID Protocols
    Zhu, Weiping
    Huang, Changyu
    Ma, Chao
    [J]. 2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 708 - 712
  • [23] Comparison of transmission schemes for framed ALOHA based RFID protocols
    Floerkemeier, C
    Wille, M
    [J]. INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2006, : 92 - 95
  • [24] Bayesian transmission strategy for framed ALOHA based RFID Protocols
    Floerkemeier, Christian
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON RFID, 2007, : 177 - 184
  • [25] Efficient RFID authentication protocols based on pseudorandom sequence generators
    Lee, Jooyoung
    Yeom, Yongjin
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2009, 51 (02) : 195 - 210
  • [26] Simulation-Based Traceability Analysis of RFID Authentication Protocols
    Alagheband, Mahdi R.
    Aref, Mohammad R.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) : 1019 - 1038
  • [27] Bayesian transmission strategy for framed ALOHA based RFID protocols
    Floerkemeier, Christian
    [J]. 2006 INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS, 2006, : 228 - 235
  • [28] A Security and Performance Evaluation of Hash-Based RFID Protocols
    Lim, Tong-Lee
    Li, Tieyan
    Li, Yingjiu
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 406 - +
  • [29] Random Graph Based Benchmarking Methodology for RFID Security Protocols
    Chang, Shan
    Song, Hui
    Lu, Li
    Yao, Qingsong
    Qi, Yong
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 184 - 191
  • [30] Simulation-Based Traceability Analysis of RFID Authentication Protocols
    Mahdi R. Alagheband
    Mohammad R. Aref
    [J]. Wireless Personal Communications, 2014, 77 : 1019 - 1038