Back to Search
Start Over
Efficient RFID Search Protocols Providing Enhanced User Privacy
- Source :
- The KIPS Transactions:PartC. :347-356
- Publication Year :
- 2009
- Publisher :
- Korea Information Processing Society, 2009.
-
Abstract
- In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.
Details
- ISSN :
- 15982858
- Database :
- OpenAIRE
- Journal :
- The KIPS Transactions:PartC
- Accession number :
- edsair.doi...........c52419b74d8c6182559350b4e5741183
- Full Text :
- https://doi.org/10.3745/kipstc.2009.16-c.3.347