Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags

被引:2
|
作者
Figueiredo, Rui [1 ]
Zuquete, Andre [1 ]
Oliveira e Silva, Tomas [1 ]
机构
[1] Univ Aveiro, IEETA, DETI, P-3810193 Aveiro, Portugal
关键词
OWNERSHIP TRANSFER; PROTOCOL;
D O I
10.1007/978-3-319-13066-8_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article proposes a massively parallel identification scheme of vehicle RFID tags. These tags use a pseudo-random identifier, which is the output of a hash function fed by a fixed secret key that uniquely identifies the tag and by two random challenges that change on each tag activation. The use of random challenges makes it extremely difficult for someone not knowing the secret key of a tag to track its multiple activations. For someone knowing all valid keys, finding out the key that generated a specific tag response requires a time-consuming exhaustive search, if the number of valid keys is large. This can be performed in a very efficient way on a general purpose graphics processing unit. Our simulations show that on a very demanding scenario a single Tesla S1070 system can identify in near real-time the tags generated by 100 single-lane highway RFID readers.
引用
收藏
页码:36 / 53
页数:18
相关论文
共 50 条
  • [21] A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems
    Fan, Xinxin
    Gong, Guang
    Engels, Daniel W.
    Smith, Eric M.
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 1083 - 1087
  • [22] Efficient Privacy-Preserving Face Identification Protocol
    Huang, Hai
    Wang, Luyao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2632 - 2641
  • [23] An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Li, Hui
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1864 - 1869
  • [24] Demo: The Ff Hardware Prototype for Privacy-Preserving RFID Authentication
    Blass, Erik-Oliver
    Elkhiyaoui, Kaoutar
    Molva, Refik
    Savry, Olivier
    Verilhac, Cedric
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 737 - 739
  • [25] Covert Channels in Privacy-Preserving Identification Systems
    Bailey, Daniel V.
    Boneh, Dan
    Goh, Eu-Jin
    Juels, Ari
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 297 - 306
  • [26] VProof: Lightweight Privacy-Preserving Vehicle Location Proofs
    Zhang, Yifan
    Tan, Chiu C.
    Xu, Fengyuan
    Han, Hao
    Li, Qun
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (01) : 378 - 385
  • [27] Privacy-Preserving Identification Systems With Noisy Enrollment
    Zhou, Linghui
    Minh Thanh Vu
    Oechtering, Tobias J.
    Skoglund, Mikael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3510 - 3523
  • [28] Privacy-preserving identification of the influential nodes in networks
    Wang, Jia-Wei
    Zhang, Hai-Feng
    Ma, Xiao-Jing
    Wang, Jing
    Ma, Chuang
    Zhu, Pei-Can
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2023, 34 (10):
  • [29] Privacy-Preserving ECC-Based Grouping Proofs for RFID
    Batina, Lejla
    Lee, Yong Ki
    Seys, Stefaan
    INFORMATION SECURITY, 2011, 6531 : 159 - +
  • [30] FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification
    Wang, Tao
    Zheng, Zhigao
    Bashir, Ali Kashif
    Jolfaei, Alireza
    Xu, Yanyan
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)