RFID tag search protocol preserving privacy of mobile reader holders

Ji Young Chun, Jung Yeon Hwang, Dong Hoon Lee

Research output: Contribution to journalArticle

18 Citations (Scopus)

Abstract

RFID tag search system which is used to find specific tags has many applications such as inventory management, supply chain, and search for books in the library. Recently, secure serverless search protocols using mobile readers are proposed in the environment where a persistent connection between mobile readers and a backend server cannot be guaranteed. However, the protocols are insecure against replay attacks and breach the privacy of mobile reader holders. In this paper, we point out the vulnerabilities of the previous protocols and propose an RFID tag search protocol which protects the privacy of mobile reader holders. Our protocol is secure against all known major attacks in RFID systems.

Original languageEnglish
Pages (from-to)50-56
Number of pages7
JournalIEICE Electronics Express
Volume8
Issue number2
DOIs
Publication statusPublished - 2011 Jan 25

Fingerprint

privacy
readers
holders
Radio frequency identification (RFID)
preserving
Network protocols
attack
inventory management
vulnerability
Supply chain management
Servers

Keywords

  • Passive tag
  • Privacy
  • RFID
  • Security
  • Serverless search

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Electrical and Electronic Engineering

Cite this

RFID tag search protocol preserving privacy of mobile reader holders. / Chun, Ji Young; Hwang, Jung Yeon; Lee, Dong Hoon.

In: IEICE Electronics Express, Vol. 8, No. 2, 25.01.2011, p. 50-56.

Research output: Contribution to journalArticle

Chun, Ji Young ; Hwang, Jung Yeon ; Lee, Dong Hoon. / RFID tag search protocol preserving privacy of mobile reader holders. In: IEICE Electronics Express. 2011 ; Vol. 8, No. 2. pp. 50-56.
@article{66e51c12706648d6843cb4e65118dc44,
title = "RFID tag search protocol preserving privacy of mobile reader holders",
abstract = "RFID tag search system which is used to find specific tags has many applications such as inventory management, supply chain, and search for books in the library. Recently, secure serverless search protocols using mobile readers are proposed in the environment where a persistent connection between mobile readers and a backend server cannot be guaranteed. However, the protocols are insecure against replay attacks and breach the privacy of mobile reader holders. In this paper, we point out the vulnerabilities of the previous protocols and propose an RFID tag search protocol which protects the privacy of mobile reader holders. Our protocol is secure against all known major attacks in RFID systems.",
keywords = "Passive tag, Privacy, RFID, Security, Serverless search",
author = "Chun, {Ji Young} and Hwang, {Jung Yeon} and Lee, {Dong Hoon}",
year = "2011",
month = "1",
day = "25",
doi = "10.1587/elex.8.50",
language = "English",
volume = "8",
pages = "50--56",
journal = "IEICE Electronics Express",
issn = "1349-2543",
publisher = "The Institute of Electronics, Information and Communication Engineers (IEICE)",
number = "2",

}

TY - JOUR

T1 - RFID tag search protocol preserving privacy of mobile reader holders

AU - Chun, Ji Young

AU - Hwang, Jung Yeon

AU - Lee, Dong Hoon

PY - 2011/1/25

Y1 - 2011/1/25

N2 - RFID tag search system which is used to find specific tags has many applications such as inventory management, supply chain, and search for books in the library. Recently, secure serverless search protocols using mobile readers are proposed in the environment where a persistent connection between mobile readers and a backend server cannot be guaranteed. However, the protocols are insecure against replay attacks and breach the privacy of mobile reader holders. In this paper, we point out the vulnerabilities of the previous protocols and propose an RFID tag search protocol which protects the privacy of mobile reader holders. Our protocol is secure against all known major attacks in RFID systems.

AB - RFID tag search system which is used to find specific tags has many applications such as inventory management, supply chain, and search for books in the library. Recently, secure serverless search protocols using mobile readers are proposed in the environment where a persistent connection between mobile readers and a backend server cannot be guaranteed. However, the protocols are insecure against replay attacks and breach the privacy of mobile reader holders. In this paper, we point out the vulnerabilities of the previous protocols and propose an RFID tag search protocol which protects the privacy of mobile reader holders. Our protocol is secure against all known major attacks in RFID systems.

KW - Passive tag

KW - Privacy

KW - RFID

KW - Security

KW - Serverless search

UR - http://www.scopus.com/inward/record.url?scp=79751480101&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79751480101&partnerID=8YFLogxK

U2 - 10.1587/elex.8.50

DO - 10.1587/elex.8.50

M3 - Article

VL - 8

SP - 50

EP - 56

JO - IEICE Electronics Express

JF - IEICE Electronics Express

SN - 1349-2543

IS - 2

ER -