Abstract
We study how to design a hash-based identification protocol in a RFID system which obtains security and privacy against active adversaries. Here, an active adversary can not only track a tag via successful or unsuccessful identifications with legal or illegal readers but also perform a compromised attack. In SPC 2003, Weis et al. used the technique of the randomized hash lock to design a privacy-preserving protocol against such active adversaries. However, in their protocol, the time complexity of identifying a requested tag is linear in the number of legal tags. It is still an open problem to design a protocol which obtains privacy against active adversaries and has a sublinear time complexity of tag identification.
In this work, we revisit this open problem. We modify the protocol of Weis et al. by using a dynamic key management scheme to manage tag identities stored in the back-end database instead of a static approach. For privacy, our protocol obtains the same privacy level as the protocol of Weis et al.. For performance, the amortized cost of tag identification of our protocol is almost twice the optimal amortized cost by a competitive analysis. For practical implementation, our protocol is very suitable to be realized in RFID systems due to its online property.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291–306. Springer, Heidelberg (2006)
Alomair, B., Poovendran, R.: Privacy versus scalability in radio frequency identification systems. Computer Communications 33(18), 2155–2163 (2010)
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID systems: a privacy-preserving protocol with constant-time identification. In: Procedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks V, DSN 2010, Chicago, Illinois, USA. IEEE (2010)
Juels, A.: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)
Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219 (2004)
Sleator, D., Tarjan, R.: Amortized efficiency of list update and paging rules. Communications of the ACM 28(2), 202–208 (1985)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, CY., Wu, HL., Chang, JC. (2013). A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-35473-1_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35472-4
Online ISBN: 978-3-642-35473-1
eBook Packages: EngineeringEngineering (R0)