Browse > Article
http://dx.doi.org/10.9708/jksci.2010.15.9.109

A Secure and Efficient RFID Tag Search Protocol Protecting Mobile Reader's Privacy  

Choi, Hyun-Woo (순천향대학교 정보보호학과)
Yeo, Don-Gu (순천향대학교 정보보호학과)
Jang, Jae-Hoon (순천향대학교 정보보호학과)
Youm, Heung-Youl (순천향대학교 정보보호학과)
Abstract
Recently, study on RFID Tag Searching technique which is used to find a specific tag in particular tag group were developed continuously. RFID tag searching technique can be applicate in various fields such as product management, finding children, and electronic anklet. To implement a RFID tag search system, RFID tag searching protocol should be considered various security threats such as reader and tag tracking, privacy, etc. For implementing a safe RFID tag lookup system, it is important to consider the potential security threats such as the tag tracking problem, and the privacy of the owner of the tag reader problem. There exists an RFID tag lookup system that satisfies a few security requirements, but the privacy of the owner of the tag reader problem has still been left unsolved, and even if it were solved, it requires a considerable amount of cryptographic operations to be performed which results in a decrease in performance. This paper proposes a system that does not degrade the performance while solving the privacy of the owner of the tag reader problem.
Keywords
RFID; tag; search;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Feldhofer and J. Wolkerstorfer, "Strong crypto for RFID tags - A comparison of low-power hardware implementations", IEEE International Symposium on Circuits and Systems, pp. 1839-1842, May 2007.
2 이상렬, "RFID 시스템의 개선된 인증 프로토콜", 컴퓨터정보학회논문지, 제 12권, 제 4호, 69-75쪽, 2007년. 12월.   과학기술학회마을
3 S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, "S3PR: Secure Serverless Search Protocols for RFID", Information Security and Assurance (ISA), pp. 187-192, April 2008.
4 S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, "Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol", International Jounal of Security and Its Applications (IJSIA), pp. 57-66, October 2008.
5 T.Y. Won, J.Y. Chun, and D.H. Lee, "Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database", Embedded and Ubiquitous Computing, pp. 153-158, December 2008.
6 천지영, 황정연, 이동훈, "이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜", 정보보호학회논문지, 19(5), 59-69쪽, 2009. 10월   과학기술학회마을
7 C.C. Tan, B. Sheng, and Q.Li, "Secure and Serverless RFID Authentication and Search Protocols", IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1400-1407, April 2008.   DOI   ScienceOn
8 I.C. Lin, S.C. Tsaur, and K.P. Chang, "Lightweight and Serverless RFID Authentication and Search Protocol", International Conference on Computer and Electrical Engineering, pp. 95-99, December 2009.
9 C.C. Tan, B. Sheng, and Q. Li, "Serverless Search and Authentication Protocols for RFID", Pervasive Computing and Communications (PerCom) Workshops, pp. 3-12, March 2007.