A hash-based pseudonymization infrastructure for RFID systems

被引:7
|
作者
Henrici, Dirk [1 ]
Goetze, Joachim [1 ]
Mueller, Paul [1 ]
机构
[1] Univ Kaiserslautern, Kaiserslautern, Germany
关键词
D O I
10.1109/SECPERU.2006.2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many proposals have been made to solve the privacy implications of RFID systems: The main idea to ensure location privacy is to change the identifiers of RFID tags regularly. For building inter-organizational RFID systems, pseudonyms can be used to provide a link to the respective owner of a tag without affecting location privacy. Based on these considerations, in this paper a pseudonymization infrastructure is presented that is based on one-way hash functions and thus is a better fit for the specific demands of resource scarce tags than approaches based on public key cryptography.
引用
收藏
页码:22 / +
页数:2
相关论文
共 50 条
  • [1] Secure Hash-based Search Protocols for RFID Systems
    He Jialiang
    Xu Zhiqiang
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
  • [2] SRFID: A hash-based security scheme for low cost RFID systems
    Khedr, Walid I.
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) : 89 - 98
  • [3] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [4] Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Tammineedi, Akhil
    Mathew, Maneesha
    Bandaru, Neelam
    Delair, Pulkit
    [J]. 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 800 - 805
  • [5] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    [J]. MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [6] Enhanced Hash-Based RFID Mutual Authentication Protocol
    Kim, Hyunsung
    [J]. COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 70 - 77
  • [7] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [8] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    [J]. Wireless Personal Communications, 2014, 75 : 219 - 232
  • [9] A scalable and provably secure hash-based RFID protocol
    Avoine, G
    Oechslin, P
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
  • [10] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) : 219 - 232