Towards Scalable Identification in RFID Systems

被引:0
|
作者
Mete Akgün
Mehmet Ufuk Çaǧlayan
机构
[1] Tübitak UEKAE,Computer Engineering Department
[2] Boǧaziçi University,undefined
来源
Wireless Personal Communications | 2016年 / 86卷
关键词
RFID; Privacy; Security; PUF; Scalability ; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
The search efficiency of radio frequency identification (RFID) protocols remains a challenging issue. There are many proposals that address the security and privacy issues of RFID, but most of them require reader work that is linear with the number of tags. Some proposals use a tree-based approach to solve the search efficiency problem. The tree-based approach reduces the search complexity from O(N)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}}(N)$$\end{document} to O(logN)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}}(\log N)$$\end{document}. However, tree-based protocols are vulnerable to tag compromising attacks due to the lack of a key-updating mechanism. Therefore, tree-based protocols are weak private in Vaudenay’s privacy model. In this paper, we propose a privacy-preserving RFID authentication protocol that does not require lookup. Our solution is based on the use of physically unclonable functions (PUFs) and is destructive-private in the Vaudenay-Model. It provides resistance against tag compromising attack by using PUFs as a secure storage mechanism to preserve the privacy of the tag.
引用
收藏
页码:403 / 421
页数:18
相关论文
共 50 条
  • [1] Towards Scalable Identification in RFID Systems
    Akgun, Mete
    Caglayan, Mehmet Ufuk
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 86 (02) : 403 - 421
  • [2] Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems
    Fahim, Abdulrahman
    Elbatt, Tamer
    Mohamed, Amr
    Al-Ali, Abdulla
    IEEE ACCESS, 2018, 6 : 27190 - 27204
  • [3] ASAP: Scalable Identification and Counting for Contactless RFID Systems
    Qian, Chen
    Liu, Yunhuai
    Ngan, Hoilun
    Ni, Lionel M.
    2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [4] Towards an Efficient Identification Process for Large-Scale RFID Systems
    Sanchez, Leonardo
    Ramos, Victor
    SENSORS, 2018, 18 (07)
  • [5] Scalable RFID Systems: a Privacy-Preserving Protocol with Constant-Time Identification
    Alomair, Basel
    Clark, Andrew
    Cuellar, Jorge
    Poovendran, Radha
    2010 IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS DSN, 2010, : 1 - 10
  • [6] Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification
    Alomair, Basel
    Clark, Andrew
    Cuellar, Jorge
    Poovendran, Radha
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) : 1536 - 1550
  • [7] A distributed architecture for scalable private RFID tag identification
    Solanas, Agusti
    Domingo-Ferrer, Josep
    Martinez-Balleste, Antoni
    Daza, Vanesa
    COMPUTER NETWORKS, 2007, 51 (09) : 2268 - 2279
  • [8] Towards Scalable Dataframe Systems
    Petersohn, Devin
    Macke, Stephen
    Xin, Doris
    Ma, William
    Lee, Doris
    Mo, Xiangxi
    Gonzalez, Joseph E.
    Hellerstein, Joseph M.
    Joseph, Anthony D.
    Parameswaran, Aditya
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (11): : 2033 - 2046
  • [9] Scalable and flexible privacy protection scheme for RFID systems
    Yeo, SS
    Kim, SK
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 153 - 163
  • [10] ASAP: Scalable Collision Arbitration for Large RFID Systems
    Qian, Chen
    Liu, Yunhuai
    Ngan, Raymond Hoilun
    Ni, Lionel M.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (07) : 1277 - 1288