Privacy Threats in RFID Group Proof Schemes

Autor: HyoungMin Ham, JooSeok Song
Jazyk: angličtina
Rok vydání: 2009
Předmět:
DOI: 10.5281/zenodo.1071454
Popis: RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier through wireless network in a short distance. If a group of RFID tags can be scanned simultaneously by one reader, RFID Group proof could be generated. Group proof can be used in various applications, such as good management which is usually achieved using barcode system. A lot of RFID group proof schemes have been proposed by many researchers. In this paper, we introduce some existing group proof schemes and then analyze their vulnerabilities to the privacy. Moreover, we propose a new attack model, which threats the privacy of user by tracking tags in a group.
{"references":["A. Juels, \"Yoking - Proofs for RFID tags,\" First International Workshop\non pervasive Computing and Communication Security, 2004.","J. Saito and K. Sakurai, \"Grouping proof for RFID tags,\" In 19th\nInternational Conference on Advanced Information Networking and\nApplications 2005, volume 2, pages 621-624, March 2005.","S. Piramuthu, \"On Existence Proofs for Multiple RFID Tags,\" IEEE\nInternational Conference on Pervasive Services (ICPS-06), June 2006.","P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A.\nRibagorda, \"Solving the simultaneous scanning problem anonymously:\nclumping proofs for RFID tags,\" In Third International Workshop on\nSecurity, Privacy and Trust in Pervasive and Ubiquitous Computing,\nSecPerl07, Istambul, Turkey, 2007.","L. Bolotnyy and G. Robins, \"Generalized Yoking Proofs for a Group of\nRFID Tags,\" International Conference on Mobile and Ubiquitous\nSystems, July 2006.","Yuanhung Lien, Xuefei Leng, Mayes, K. Jung-Hui Chiu, \"Reading order\nindependent grouping proof for RFID tags,\" Intelligence and Security\nInformatics, 2008. ISI 2008. pp.128-136, 17-20 June 2008.","Sangjin KIM, Jihwan LIM, Jaehong HAN, Heekuck OH, \"Efficient\nRFID Search Protocols Using Counters,\" IEICE TRANSACTIONS on\nCommunications, Vol.E91-B , No.11, pp.3552-3559, November 2008"]}
Databáze: OpenAIRE