Published January 1, 2016
| Version v1
Journal article
Open
Towards Scalable Identification in RFID Systems
Creators
- 1. Tubitak UEKAE, TR-41470 Kocaeli, Turkey
- 2. Bogazici Univ, Dept Comp Engn, Istanbul, Turkey
Description
The search efficiency of radio frequency identification (RFID) protocols remains a challenging issue. There are many proposals that address the security and privacy issues of RFID, but most of them require reader work that is linear with the number of tags. Some proposals use a tree-based approach to solve the search efficiency problem. The tree-based approach reduces the search complexity from to . However, tree-based protocols are vulnerable to tag compromising attacks due to the lack of a key-updating mechanism. Therefore, tree-based protocols are weak private in Vaudenay's privacy model. In this paper, we propose a privacy-preserving RFID authentication protocol that does not require lookup. Our solution is based on the use of physically unclonable functions (PUFs) and is destructive-private in the Vaudenay-Model. It provides resistance against tag compromising attack by using PUFs as a secure storage mechanism to preserve the privacy of the tag.
Files
bib-00a10370-0750-42a1-87d0-cda34b7e999e.txt
Files
(131 Bytes)
| Name | Size | Download all |
|---|---|---|
|
md5:7d4714bd60b5520be737a2c241991e33
|
131 Bytes | Preview Download |