DocumentCode :
1497098
Title :
Reducing RFID reader load with the meet-in-the-middle strategy
Author :
Cheon, Jung Hee ; Hong, Jeongdae ; Tsudik, Gene
Author_Institution :
Dept. of Math. Sci., Seoul Nat. Univ., Seoul, South Korea
Volume :
14
Issue :
1
fYear :
2012
Firstpage :
10
Lastpage :
14
Abstract :
When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to O(√N log N) without increasing communication cost. Our technique is based on the well-known "meet-in-the- middle" strategy used in the past to attack symmetric ciphers.
Keywords :
authorisation; computational complexity; computer crime; data privacy; radiofrequency identification; RFID reader load reduction; brute-force search; embedded key; lightweight tag identification; meet-in-the-middle strategy; pseudorandom function; radiofrequency identification system; reader computation; symmetric ciphers attack; tag privacy; tag-reader interaction; Authentication; Cryptography; Educational institutions; Privacy; Protocols; Radiofrequency identification; Authentication; meet-in-the-middle strategy; pseudo-random function (PRF); radio frequency identification (RFID) identification;
fLanguage :
English
Journal_Title :
Communications and Networks, Journal of
Publisher :
ieee
ISSN :
1229-2370
Type :
jour
DOI :
10.1109/JCN.2012.6184545
Filename :
6184545
Link To Document :
بازگشت