Skip to main content

A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols

  • Conference paper
Advances in Intelligent Systems and Applications - Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 21))

Abstract

We study how to design a hash-based identification protocol in a RFID system which obtains security and privacy against active adversaries. Here, an active adversary can not only track a tag via successful or unsuccessful identifications with legal or illegal readers but also perform a compromised attack. In SPC 2003, Weis et al. used the technique of the randomized hash lock to design a privacy-preserving protocol against such active adversaries. However, in their protocol, the time complexity of identifying a requested tag is linear in the number of legal tags. It is still an open problem to design a protocol which obtains privacy against active adversaries and has a sublinear time complexity of tag identification.

In this work, we revisit this open problem. We modify the protocol of Weis et al. by using a dynamic key management scheme to manage tag identities stored in the back-end database instead of a static approach. For privacy, our protocol obtains the same privacy level as the protocol of Weis et al.. For performance, the amortized cost of tag identification of our protocol is almost twice the optimal amortized cost by a competitive analysis. For practical implementation, our protocol is very suitable to be realized in RFID systems due to its online property.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291–306. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Alomair, B., Poovendran, R.: Privacy versus scalability in radio frequency identification systems. Computer Communications 33(18), 2155–2163 (2010)

    Article  Google Scholar 

  3. Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID systems: a privacy-preserving protocol with constant-time identification. In: Procedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks V, DSN 2010, Chicago, Illinois, USA. IEEE (2010)

    Google Scholar 

  4. Juels, A.: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  5. Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219 (2004)

    Google Scholar 

  6. Sleator, D., Tarjan, R.: Amortized efficiency of list update and paging rules. Communications of the ACM 28(2), 202–208 (1985)

    Article  MathSciNet  Google Scholar 

  7. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-Yuan Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, CY., Wu, HL., Chang, JC. (2013). A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35473-1_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35472-4

  • Online ISBN: 978-3-642-35473-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics