Back to Search
Start Over
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
- Source :
-
IEEE Transactions on Parallel & Distributed Systems . Aug2012, Vol. 23 Issue 8, p1536-1550. 0p. - Publication Year :
- 2012
-
Abstract
- In RFID literature, most “privacy-preserving” protocols require the reader to search all tags in the system in order to identify a single tag. In another class of protocols, the search complexity is reduced to be logarithmic in the number of tags, but it comes with two major drawbacks: it requires a large communication overhead over the fragile wireless channel, and the compromise of a tag in the system reveals secret information about other, uncompromised, tags in the same system. In this work, we take a different approach to address time complexity of private identification in large-scale RFID systems. We utilize the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFID systems with constant-time identification. Instead of increasing communication overhead, the existence of a large storage device in RFID systems, the database, is utilized for improving the time efficiency of tag identification. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 10459219
- Volume :
- 23
- Issue :
- 8
- Database :
- Academic Search Index
- Journal :
- IEEE Transactions on Parallel & Distributed Systems
- Publication Type :
- Academic Journal
- Accession number :
- 77496612
- Full Text :
- https://doi.org/10.1109/TPDS.2011.290