Privacy protection for RFID with hidden subset identifiers

被引:0
|
作者
Cichon, Jacek [1 ]
Klonowski, Marek [1 ]
Kutylowski, Miroslaw [1 ]
机构
[1] Wroclaw Univ Technol, Inst Math & Comp Sci, PL-50370 Wroclaw, Poland
来源
PERVASIVE COMPUTING | 2008年 / 5013卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose very simple and cheap but nevertheless effective protection against privacy threats for RFID-tags. For the hidden subset RFID-tags proposed in this paper, the ID string presented by an RFID-tag evolves rapidly. It is is not the bit value that enables one to recognize a tag. Instead, a reader detects some invariant properties that are hard to be recognized by a curious illegitimate reader. The solution is not based on any cryptographic primitive, it relies only on properties of random sets and on linear mappings between vector spaces. The solution proposed is well suited for low-end devices, since all mechanisms can be easily implemented by circuits of a small size.
引用
收藏
页码:298 / 314
页数:17
相关论文
共 50 条
  • [31] Efficient Security and Privacy Protection for Emerging Smart RFID Communications
    Sadikin, Mohammad Fal
    Kyas, Marcel
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2014, 2 (03) : 156 - 165
  • [32] Efficient security and privacy protection for emerging smart RFID communications
    Sadikin M.F.
    Kyas M.
    International Journal of Networked and Distributed Computing, 2014, 2 (3) : 156 - 165
  • [33] RFID authentication protocol for anti-counterfeiting and privacy protection
    Chen, Yung-Chin
    Wang, Wei-Lin
    Hwang, Min-Shiang
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 255 - 259
  • [34] Personal Privacy Protection Framework Based on Hidden Technology for Smartphones
    Hong, Shuangxi
    Liu, Chuanchang
    Ren, Bingfei
    Huang, Yuze
    Chen, Junliang
    IEEE ACCESS, 2017, 5 : 6515 - 6526
  • [35] RFID-Tate: Efficient Security and Privacy Protection for Active RFID over IEEE 802.15.4
    Sadikin, Mohammad Fal
    Kyas, Marcel
    5TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS, IISA 2014, 2014, : 335 - 340
  • [36] Privacy-Mode Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things
    Li, Yang
    Nakasone, Toshiki
    Ohta, Kazuo
    Sakiyama, Kazuo
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [37] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Zhang, Wei
    Liu, Sanya
    Wang, Shengming
    Yi, Baolin
    Wu, Longkai
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1215 - 1228
  • [38] Privacy protection based on user-defined preferences in RFID system
    Kim, I
    Lee, B
    Kim, H
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U858 - U862
  • [39] Integrity improvements to an RFID privacy protection protocol for anti-counterfeiting
    Zhang, XL
    King, B
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 474 - 481
  • [40] Constructing effective lightweight privacy protection in RFID-based systems
    Po-Jen Chuang
    Yen-Feng Tu
    The Journal of Supercomputing, 2021, 77 : 9658 - 9688