RFID tag search protocol preserving privacy of mobile reader holders
スポンサーリンク
概要
- 論文の詳細を見る
RFID tag search system which is used to find specific tags has many applications such as inventory management, supply chain, and search for books in the library. Recently, secure serverless search protocols using mobile readers are proposed in the environment where a persistent connection between mobile readers and a backend server cannot be guaranteed. However, the protocols are insecure against replay attacks and breach the privacy of mobile reader holders. In this paper, we point out the vulnerabilities of the previous protocols and propose an RFID tag search protocol which protects the privacy of mobile reader holders. Our protocol is secure against all known major attacks in RFID systems.
著者
-
Chun Ji
Graduate School of Information Management & Security, CIST, Korea University
-
Hwang Jung
Electronics and Telecommunications Research Institute (ETRI)
-
Lee Dong
Graduate School of Information Management & Security, CIST, Korea University
関連論文
- RFID tag search protocol preserving privacy of mobile reader holders
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
- Stronger Chikazawa-Yamagishi ID-Based Key Distribution
- Searchable Encryption with Keyword-Recoverability
- SSR (Smart Sleep Recognizer): Making Decision Based on Probability of User's Intension (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Change of Rotated Cube Texture through Multi-processing in 3% Si-steels
- Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
- Analysis of Revocable-iff-Linked Ring Signature Scheme
- Strong ID-Based Key Distribution
- Three-Round Smart Card-Based Key Exchange Scheme(Fundamental Theories for Communications)
- On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing(Information Security)
- Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data