A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation

被引:0
|
作者
Nohara, Yasunobu [1 ]
Inoue, Sozo [1 ]
机构
[1] Kyushu Univ, Nishi Ku, Fukuoka 8190395, Japan
关键词
RFID; Unlinkability; Hash-chain scheme; d-left hash table;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a secure identification scheme for RFID with efficient time and memory, and also an efficient update of pre-computed values on the server side. Although RFID ( Radio Frequency IDentification) is becoming popular with pervasive computing environments, a privacy problem still remains, where an adversary can trace users' behavior by linking identification log by adversary readers. For this problem, a hash-chain scheme has been proposed as a secure identification for low-cost RFID tags, and its long identification time has been reduced by Avoine et al. using pre-computation on the server side. However, Avoine's scheme uses static pre-computation, and therefore pre-computed values include ones which are already used and no longer used. An efficient update of pre-computation is needed to remove these wasted values and this can reduce memory usage. In this paper, we optimize a lookup of pre-computed values using d-left hashing, which is a fast lookup technique, and provide efficient update of pre-computed values. We also show reasonable analytical evaluation and experimental result for memory and pre-computation/identification/update time.
引用
收藏
页码:65 / 74
页数:10
相关论文
共 30 条
  • [1] A scalable and provably secure hash-based RFID protocol
    Avoine, G
    Oechslin, P
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
  • [2] Secure Hash-based Search Protocols for RFID Systems
    He Jialiang
    Xu Zhiqiang
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
  • [3] A hash-based pseudonymization infrastructure for RFID systems
    Henrici, Dirk
    Goetze, Joachim
    Mueller, Paul
    [J]. SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
  • [4] Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems
    M. Sandhya
    T. R. Rangaswamy
    [J]. Arabian Journal for Science and Engineering, 2014, 39 : 1897 - 1906
  • [5] Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems
    Sandhya, M.
    Rangaswamy, T. R.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (03) : 1897 - 1906
  • [6] HASH-BASED FILE CONTENT IDENTIFICATION USING DISTRIBUTED SYSTEMS
    Yannikos, York
    Schluessler, Jonathan
    Steinebach, Martin
    Winter, Christian
    Graffi, Kalman
    [J]. ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 119 - 134
  • [7] Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Tammineedi, Akhil
    Mathew, Maneesha
    Bandaru, Neelam
    Delair, Pulkit
    [J]. 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 800 - 805
  • [8] Secure Hash-Based Password Authentication Protocol Using Smartcards
    Jung, Hyunhee
    Kim, Hyun Sung
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 593 - 606
  • [9] Hash-based RFID security protocol using randomly key-changed identification procedure
    Zhai, Jia
    Park, Chang Mok
    Wang, Gi-Nam
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 296 - 305
  • [10] SRFID: A hash-based security scheme for low cost RFID systems
    Khedr, Walid I.
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) : 89 - 98