Journal ArticleDOI
Secure and Serverless RFID Authentication and Search Protocols
Chiu C. Tan,Bo Sheng,Qun Li +2 more
Reads0
Chats0
TLDR
A more flexible authentication protocol that provides comparable protection without the need for a central database is proposed and a protocol for secure search for RFID tags is suggested.Abstract:
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we propose a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to securely search for RFID tags will be increasingly useful.read more
Citations
More filters
Proceedings ArticleDOI
Counting RFID Tags Efficiently and Anonymously
TL;DR: This paper presents an efficient and anonymous scheme for tag population estimation that leverages the position of the first reply from a group of tags in a frame and outperforms other protocols proposed in the previous work.
Journal ArticleDOI
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
TL;DR: This paper proposes a lightweight privacy-preserving authentication protocol for the RFID system by considering the ideal PUF environment, and introduces an enhanced protocol which can support the noisyPUF environment.
Journal ArticleDOI
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.
Journal ArticleDOI
rfid in pervasive computing: State-of-the-art and outlook
George Roussos,Vassilis Kostakos +1 more
TL;DR: This survey considers developments towards establishing rfid as the cost-effective technical solution for the development of open, shared, universal pervasive computing infrastructures and looks ahead to its future.
Journal ArticleDOI
Fast tag searching protocol for large-scale RFID systems
Yuanqing Zheng,Mo Li +1 more
TL;DR: The results demonstrate that the proposed tag searching protocol is highly efficient in terms of both time efficiency and transmission overhead, leading to good applicability and scalability for large-scale RFID systems.
References
More filters
Journal ArticleDOI
RFID security and privacy: a research survey
TL;DR: This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Book ChapterDOI
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
TL;DR: Privacy and security risks and how they apply to the unique setting of low-cost RFID devices are described and several security mech- anisms are proposed and suggested areas for future research are suggested.
Book ChapterDOI
Authenticating pervasive devices with human protocols
Ari Juels,Stephen A. Weis +1 more
TL;DR: This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
Proceedings ArticleDOI
Privacy and security in library RFID: issues, practices, and architectures
David Molnar,David Wagner +1 more
TL;DR: Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations.
Cryptographic Approach to “Privacy-Friendly” Tags
TL;DR: This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism.