Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags

被引:2
|
作者
Figueiredo, Rui [1 ]
Zuquete, Andre [1 ]
Oliveira e Silva, Tomas [1 ]
机构
[1] Univ Aveiro, IEETA, DETI, P-3810193 Aveiro, Portugal
关键词
OWNERSHIP TRANSFER; PROTOCOL;
D O I
10.1007/978-3-319-13066-8_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This article proposes a massively parallel identification scheme of vehicle RFID tags. These tags use a pseudo-random identifier, which is the output of a hash function fed by a fixed secret key that uniquely identifies the tag and by two random challenges that change on each tag activation. The use of random challenges makes it extremely difficult for someone not knowing the secret key of a tag to track its multiple activations. For someone knowing all valid keys, finding out the key that generated a specific tag response requires a time-consuming exhaustive search, if the number of valid keys is large. This can be performed in a very efficient way on a general purpose graphics processing unit. Our simulations show that on a very demanding scenario a single Tesla S1070 system can identify in near real-time the tags generated by 100 single-lane highway RFID readers.
引用
收藏
页码:36 / 53
页数:18
相关论文
共 50 条
  • [31] Privacy-Preserving Multimodal Person and Object Identification
    Koval, Oleksiy
    Voloshynovskiy, Sviatoslav
    Pun, Thierry
    MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, 2008, : 177 - 184
  • [32] Efficient and privacy-preserving biometric identification in cloud
    Hahn, Changhee
    Hur, Junbeom
    ICT EXPRESS, 2016, 2 (03): : 135 - 139
  • [33] Privacy-Preserving Data Visualization using Parallel Coordinates
    Dasgupta, Aritra
    Kosara, Robert
    VISUALIZATION AND DATA ANALYSIS 2011, 2011, 7868
  • [34] Adaptive Privacy-Preserving Visualization Using Parallel Coordinates
    Dasgupta, Aritra
    Kosara, Robert
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2011, 17 (12) : 2241 - 2248
  • [35] Privacy-Preserving Parallel Computation of Minimum Spanning Forest
    Anagreh M.
    Laud P.
    Vainikko E.
    SN Computer Science, 3 (6)
  • [36] Parallel Privacy-preserving Computation of Minimum Spanning Trees
    Anagreh, Mohammad
    Vainikko, Eero
    Laud, Peeter
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 181 - 190
  • [37] DL-Tags: DLT and Smart Tags for Decentralized, Privacy-Preserving, and Verifiable Supply Chain Management
    Bencic, Federico Matted
    Skocir, Pavle
    Zarko, Ivana Podnar
    IEEE ACCESS, 2019, 7 : 46198 - 46209
  • [38] High-Speed Dating Privacy-Preserving Attribute Matching for RFID
    Batina, Lejla B
    Hermans, Jens
    Hoepman, Jaap-Henk
    Krasnova, Anna
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 19 - 35
  • [39] A privacy-preserving efficient RFID authentication protocol from SLPN assumption
    Mamun, Mohammad Saiful Islam
    Miyaji, Atsuko
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 10 (03) : 234 - 243
  • [40] A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols
    Lee, Chih-Yuan
    Wu, Hsin-Lung
    Chang, Jen-Chun
    Smart Innovation, Systems and Technologies, 2013, 21 : 15 - 23