Abstract
We propose a novel privacy-protecting RFID system using password streaming. Our scheme assumes a centralized back-end system containing a database of tag passwords. A reader uses this database to broadcast password “guesses” continuously in its domain, without it needing to scan for the presence of tags. A tag that receives a matching password tells the reader it is present, and the password is replaced with a new one that is synchronized both in the tag and the database. Our scheme also assumes multiple readers with their respective domains in a large physical space. As tags and attackers (adversaries intent on compromising privacy) move between domains, the back-end system coordinates the readers’ password streams to defend against attacks. Our scheme pushes the computational complexity to the back-end system, very much in the spirit of RFID. It defends against stronger types of attacks than those in [4].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Juels, A.: RFID security and privacy: A research survey. IEEE J. Sel. Areas Commun. 24, 381–394 (2006)
Langheinrich, M., Marti, R.: Practical minimalist cryptography for RFID privacy. IEEE Systems Journal 1, 115–128 (2007)
Shamir, A.: How to share a secret. Comm. of the ACM 22, 612–613 (1979)
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Security in Communication Networks, Amalfi, Italy, pp. 149–164 (September 2004)
Law, C., Lee, K., Siu, K.-Y.: Efficient memoryless protocol for tag identification. In: Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Boston, MA, August 2000, pp. 75–84 (2000)
Vogt, H.: Multiple object identification with passive RFID tags. In: International Conference on Systems, Man and Cybernetics, Hammamet, Tunisia (October 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, V.K.Y., Campbell, R.H. (2008). Password Streaming for RFID Privacy. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2008 Workshops. OTM 2008. Lecture Notes in Computer Science, vol 5333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88875-8_113
Download citation
DOI: https://doi.org/10.1007/978-3-540-88875-8_113
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88874-1
Online ISBN: 978-3-540-88875-8
eBook Packages: Computer ScienceComputer Science (R0)