Privacy protection for RFID with hidden subset identifiers

被引:0
|
作者
Cichon, Jacek [1 ]
Klonowski, Marek [1 ]
Kutylowski, Miroslaw [1 ]
机构
[1] Wroclaw Univ Technol, Inst Math & Comp Sci, PL-50370 Wroclaw, Poland
来源
PERVASIVE COMPUTING | 2008年 / 5013卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose very simple and cheap but nevertheless effective protection against privacy threats for RFID-tags. For the hidden subset RFID-tags proposed in this paper, the ID string presented by an RFID-tag evolves rapidly. It is is not the bit value that enables one to recognize a tag. Instead, a reader detects some invariant properties that are hard to be recognized by a curious illegitimate reader. The solution is not based on any cryptographic primitive, it relies only on properties of random sets and on linear mappings between vector spaces. The solution proposed is well suited for low-end devices, since all mechanisms can be easily implemented by circuits of a small size.
引用
收藏
页码:298 / 314
页数:17
相关论文
共 50 条
  • [41] An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
    Zhu, Hongfeng
    Zhang, Yan
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1777 - 1787
  • [42] An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection
    Wei Zhang
    Sanya Liu
    Shengming Wang
    Baolin Yi
    Longkai Wu
    Wireless Personal Communications, 2017, 96 : 1215 - 1228
  • [43] Constructing effective lightweight privacy protection in RFID-based systems
    Chuang, Po-Jen
    Tu, Yen-Feng
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (09): : 9658 - 9688
  • [44] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [45] Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    IETE TECHNICAL REVIEW, 2015, 32 (03) : 183 - 187
  • [46] eMARP: Enhanced mobile agent for RFID privacy protection and forgery detection
    Yeo, Sang-Soo
    Kim, Soo-Cheol
    Kim, Sung Kwon
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2007, 4496 : 318 - +
  • [47] A Privacy Protection Protocol For RFID-enabled Supply Chain System
    Xia, XianYao
    Han, ShuiHua
    2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 161 - +
  • [48] Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol
    Fan, Kai
    Wang, Wei
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [49] Vulnerabilities in Chen and Dengs RFID mutual authentication and privacy protection protocol
    Information Systems and Operations Management, University of Florida, Gainesville, FL 32611-7169, United States
    不详
    Eng Appl Artif Intell, 7 (1300-1302):
  • [50] Flexible privacy protection for RFID tags via selective identifier masking
    Lim, Tong-Lee
    Li, Tieyan
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 1570 - 1575