Browse > Article

Improving Scalability using Parallelism in RFID Privacy Protection  

Shin Myeong-Sook (조선대학교 전자정보공과대학 컴퓨터공학과)
Lee Joon (조선대학교 전자정보공과대학 컴퓨터공학과)
Abstract
In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to $O(\frac{m{^2/3}}{w})$ than the existing form.
Keywords
RFID; Privacy Protection; Hash Chain Scheme; Hellman Method; Parallelism;
Citations & Related Records
연도 인용수 순위
  • Reference
1 김이남, '병렬처리를 통한 AES 알고리즘에 관한 연구', 석사학위논문, Dec. 2002
2 Association for Automation Identification and Data Capture Technologies (AIM) (2002), Shrouds of Time: The History of RFID. http://www.aimglobal.org, Last accessed August 22, 2004
3 Gildas Avoine and Philippe Oechslin. 'A scalable and provably secure hash based RFID protocol'. In IEEE International Workshop on Pervasive Computing and Communication Security - PerSec 2005, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press
4 M. Ohkubo, K. Suzuki, and S. Kinoshita. 'Cryptographic approach to 'privacy-friendly' tags'. In RFID Privacy Workshop, MIT, USA, 2003
5 M. Hellman. 'A cryptanalytic time-memory trade off'. IEEE Transactions on Information Theory, IT-26(4): 401:406, 1980
6 이승구, 여상수, 조정직, 김성권, 'RFID 시스템에서 안전하고 효율적인 프라이버시 보호 기법', 한국컴퓨터 종합학술대회, Vol 32, No 1(A), 2005년