Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.5.59

RFID Tag Search Protocol Preserving Privacy of Reader Holders  

Chun, Ji-Young (Graduate School of Information Management and Security, Korea University)
Hwang, Jung-Yeon (Electronics and Telecommunications Research Institute)
Lee, Dong-Hoon (Graduate School of Information Management and Security, Korea University)
Abstract
RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.
Keywords
RFID; Privacy; Security; Search protocol; Passive tag;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 하재철, 백이루, 김환구, 박제춘, 문상재, '해쉬함수에 기반한 경량화된 RFID 인증 프로토콜,' 정보보호학회논문지, 19(3), pp. 61-72, 2009년 6월
2 M. Burmester, B. Medeiros, and R. Motta, 'Provably Secure GroupingProofs for RFID Tags.' CARDIS. LNCS 5189, pp. 176-190, 2008
3 T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips, 'Guidelines for Securing Radio .Frequency Identification (RFID) Systems,' National Institute of Standards and Technology(NIST) Special Publication 800-98, p. 154, Apr. 2007
4 'Radio Frequency Identification (RFID): A Focus on Information Security and Privacy,' OECD Working Party on Information Security and Privacy, DSTI/ICCP/REG(2007)9/FINAL, p. 70. Jan. 2008
5 G. Tsudik, 'YA-TRAP: Yet Another Trivial RFID Authentication Protocol,' Pervasive Computing and Communications(PerCom) Workshops, pp. 640-643, Mar. 2006   DOI
6 S.l. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, 'S3PR : Secure Serverless Search Protocols for RFID,' Information Security and Assurance (ISA), pp. 187-192, Apr. 2008   DOI
7 M. Feldhofer and J. Wolkerstorfer, 'Strong crypto for RFID tags-A comparison of low-power hardware implementations,' IEEE International Symposium on Circuits and Systems GSCAS), pp. 1839 -1842, May 2007
8 R. Paise and S. Vaudenay, 'Mutual authentication in RFID: security and privacy,' ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 292-299, Mar. 2008   DOI
9 원태연, 천지영, 박춘식, 이동훈, '수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계,; 정보보호학회논문지, 18(6A), pp. 63-73, 2008년 12월
10 권혜진, 이재욱, 전동호, 김순자, '데이터베이스에서의 태그 검색이 쉽고 안전한 RFID 상호인증 프로토콜,' 정보보호학회논문지, 18(5), pp. 125-134, 2008년 10월   과학기술학회마을
11 H.Y. Chien and T.C. Wu. 'Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denialof- Service Attacks.' 정보보호학회논문지, 18(6B), pp. 259-269. 2008년 12월
12 H. Gilbert, M. Robshaw, and Y. Seurin, 'HB#: Increasing the Security and Efficiency of HB+,' Advances in Cryptology-EUROCRYPT, LNCS 4965, pp. 361-378, 2008
13 정윤수, 김용태, 박길철, 이상호, 'RFID를 이용한 IPTV 사용자의 경량화 인증 프로토콜,' 정보보호학회논문지, 19(2), pp. 105-115, 2009년 4월
14 M. Ohkubo, K. Suzuki, and S. Kinoshita, 'Cryptographic Approach to 'privacyFriondly' Tags,' In RFID Privacy Workshop, Nov. 2003
15 C. Tan, B. Sheng, and Q. Li, 'Serverless Search and Authentication Protocols for RFID,' Pervasive Computing and Communications(PerCom) Workshops, pp. 3-12, Mar. 2007
16 S. Vaudenay, 'On Privacy Models for RFID,' Advances in Cryptology- ASIACRYPT, LNCS 4833, pp. 68-87, 2007
17 A. Juels and S.A. Weis, 'Authenticating Pervasive Devices with Human Protocols,' Advances in Cryptology- Crypto, LNCS 3621, pp. 293-308, 2005
18 C.C.Tan, B. Sheng, and Q. Li, 'Secure and Serverless RFlD Authentication and Search Protocols,' IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1400-1407, Apr. 2008   DOI   ScienceOn