Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.12.2695

A Scheme of Computational Time Reduction on Back-End Server Using Computational Grid  

Hong, Seong-Pyo (조선대학교 산학협력단)
Han, Seung-Jo (조선대학교 정보통신공학과)
Abstract
We need privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect user's privacy in RFID system. The hash-chain based protocol that Ohkubo et. al proposed is the most secure protocol, that satisfies all of the essential security requirements, among existing protocols. But, this protocol has a disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the hash-chain based protocol.
Keywords
RFID Privacy Protection; Hash-Chain based Protocol; Grid Computing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yu Tian-tian, Feng Quan-yuan, "A Security RFID Authentication Protocol Based on Hash Function", 2009 International Symposium on Information Engineering and Electronic Commerce, pp.804-807, 2009.
2 M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic approach to privacy-friendly tags", In RFID Privacy Workshop, 2003.
3 M. Ohkubo, K.Suzuki and S. Kinoshita, "Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID", Proceedings of the SCIS 2004, pp.719-724, 2004.
4 Boyeon Song, and Chris J Mitchell, "RFID Authentication Protocol for Low-cost Tags", ACM Conference on Wireless Network Security(WiSec'08), 2008.
5 D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," ACM Conference Commun. Comput. Security(CCS '04), pp. 210-219, 2004.
6 S. Sarma, S. Weis, and D. Engels, "RFID Systems and Security and Privacy Implications," Workshop on Cryptographic Hardware and Embedded Systems, pp.454-470, 2002.
7 S. S. Yeo, K. Sakurai, S. E. Choi, K. S. Yang, and S. K. Kim, "Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard", In Proceedings of Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, Vol. 4743, pp.245-254, 2007.
8 V. Berstis, Fundamentals of Grid Computing, Reading Mass, IBM Redbook, 2002.
9 I. Foster and C. Kesselman and S. Tuecke, "The Anatomy of the Grid", The International Journal of High Performance Computing Applications, vol. 15, no.3, pp.200-222, 2001.   DOI   ScienceOn
10 Li, C., Xiao, N., Yang, X., "Application availability measurement in computational grid", Proceedings of the 2nd workshop on Grid and Cooperative Computing (GCC2003), Springer LNCS 3032, pp. 151-154, 2003.
11 Chunjiang Li, Nong Xiao, and Xuejun Yang., "Predicting the Reliability of Resources in Computational Grid," Grid and Cooperative Computing 2004, LNCS 3251, pp. 233-240, 2004
12 이춘희, "그리드퓨팅(Grid Computing)", 정보처리학회논문지, Vol 10(1), 2003.