Published January 1, 2016 | Version v1
Journal article Open

Towards Scalable Identification in RFID Systems

  • 1. Tubitak UEKAE, TR-41470 Kocaeli, Turkey
  • 2. Bogazici Univ, Dept Comp Engn, Istanbul, Turkey

Description

The search efficiency of radio frequency identification (RFID) protocols remains a challenging issue. There are many proposals that address the security and privacy issues of RFID, but most of them require reader work that is linear with the number of tags. Some proposals use a tree-based approach to solve the search efficiency problem. The tree-based approach reduces the search complexity from to . However, tree-based protocols are vulnerable to tag compromising attacks due to the lack of a key-updating mechanism. Therefore, tree-based protocols are weak private in Vaudenay's privacy model. In this paper, we propose a privacy-preserving RFID authentication protocol that does not require lookup. Our solution is based on the use of physically unclonable functions (PUFs) and is destructive-private in the Vaudenay-Model. It provides resistance against tag compromising attack by using PUFs as a secure storage mechanism to preserve the privacy of the tag.

Files

bib-00a10370-0750-42a1-87d0-cda34b7e999e.txt

Files (131 Bytes)

Name Size Download all
md5:7d4714bd60b5520be737a2c241991e33
131 Bytes Preview Download