Secure Tag Search in RFID Systems Using Mobile Readers
- 21 April 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Dependable and Secure Computing
- Vol. 12 (2), 230-242
- https://doi.org/10.1109/tdsc.2014.2302305
Abstract
One of the important features of an RFID system is its ability to search for a particular tag among a group of tags. In order to ensure privacy and security of the tags, the search has to be conducted in a secure fashion. To our knowledge not much work has been done in this secure search area of RFID. The minimal work that has been done do not comply with the EPC C1G2 (Class-1 Gen-2) standard since most of them use expensive hash operations or sophisticated encryption schemes that cannot be implemented in the low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol that is based on simple XOR encryption and 128 bit pseudo random number generators (PRNG), operations that can be easily implemented on low-cost passive tags. Thus, our protocol enables large scale implementations and achieves EPC C1G2 compliance while meeting the security requirements. The protocol provides additional protection by hiding the pseudo-random number during all transmissions using a blind-factor.Keywords
This publication has 47 references indexed in Scilit:
- A designated query protocol for serverless mobile RFID systems with reader and tag privacyTsinghua Science and Technology, 2012
- Fast Tag Searching Protocol for Large-Scale RFID SystemsIEEE/ACM Transactions on Networking, 2012
- Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile ReaderLecture Notes in Computer Science, 2012
- Vulnerability analysis of lightweight secure search protocols for low-cost RFID systemsInternational Journal of Radio Frequency Identification Technology and Applications, 2012
- An optimal probabilistic solution for information confinement, privacy, and security in RFID systemsJournal of Network and Computer Applications, 2011
- Untraceable and Serverless RFID Authentication and Search ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- RFID tag search protocol preserving privacy of mobile reader holdersIEICE Electronics Express, 2011
- Authentication and secret search mechanisms for RFID-aware wireless sensor networksInternational Journal of Security and Networks, 2010
- Secure and private search protocols for RFID systemsInformation Systems Frontiers, 2009
- Strong Authentication Protocol for Secure RFID Tag Search without Help of Central DatabasePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008