Abstract
RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.
Original language | English |
---|---|
Title of host publication | Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 |
Pages | 153-158 |
Number of pages | 6 |
Volume | 2 |
DOIs | |
Publication status | Published - 2008 Dec 1 |
Event | 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, China Duration: 2008 Dec 17 → 2008 Dec 20 |
Other
Other | 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 |
---|---|
Country | China |
City | Shanghai |
Period | 08/12/17 → 08/12/20 |
Fingerprint
Keywords
- Authentication
- Privacy
- RFID
- Security
- Serverless
- Tag Search
ASJC Scopus subject areas
- Computer Networks and Communications
- Software
- Communication
Cite this
Strong authentication protocol for secure RFID tag search without help of central database. / Won, Tae Youn; Chun, Ji Young; Lee, Dong Hoon.
Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. Vol. 2 2008. p. 153-158 4755222.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Strong authentication protocol for secure RFID tag search without help of central database
AU - Won, Tae Youn
AU - Chun, Ji Young
AU - Lee, Dong Hoon
PY - 2008/12/1
Y1 - 2008/12/1
N2 - RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.
AB - RFID tag search is to find a particular tag in a group of tags by using a portable reader. Since a portable reader has own identifier and secret values associated with each tag, the portable reader can wirelessly communicate with the tag without help of central database. The RFID tag search can be useful to find a lost book among all RFID-tagged books in a library. However, the basic operation for RFID tag search has security and privacy problems. Secure search protocols to solve these problems were firstly discussed by Tan et al. Nonetheless, their protocols don't perfectly solve an illegal tag tracking problem by a reuse attack of a search query and also have an illegal reader tracking problem by revealing the portable reader ID over an insecure channel. In this paper, we propose strong authentication protocol for secure RFID tag search without help of central database which utilizes a block cipher (AES-128) and a timestamp. Our protocol can search a particular tag efficiently, and preserve user privacy against all major attacks.
KW - Authentication
KW - Privacy
KW - RFID
KW - Security
KW - Serverless
KW - Tag Search
UR - http://www.scopus.com/inward/record.url?scp=63149152263&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=63149152263&partnerID=8YFLogxK
U2 - 10.1109/EUC.2008.54
DO - 10.1109/EUC.2008.54
M3 - Conference contribution
AN - SCOPUS:63149152263
SN - 9780769534923
VL - 2
SP - 153
EP - 158
BT - Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
ER -