Back to Search Start Over

Efficient RFID Search Protocols Providing Enhanced User Privacy

Authors :
Mun-Kyu Lee
DaeHun Nyang
Ji Hwan Lim
Sang Jin Kim
Heekuck Oh
Source :
The KIPS Transactions:PartC. :347-356
Publication Year :
2009
Publisher :
Korea Information Processing Society, 2009.

Abstract

In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.

Details

ISSN :
15982858
Database :
OpenAIRE
Journal :
The KIPS Transactions:PartC
Accession number :
edsair.doi...........c52419b74d8c6182559350b4e5741183
Full Text :
https://doi.org/10.3745/kipstc.2009.16-c.3.347