Title :
On Refresh-Based Tag Identification Schemes
Author_Institution :
Inf. Security Group, Univ. of London, Egham
Abstract :
We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.
Keywords :
cryptography; data privacy; radiofrequency identification; ubiquitous computing; RFID applications; hidden adversarial communication channel; insubvertible encryption; pervasive computing environment; privacy; refresh techniques; security properties; tag identification scheme; universal re-encryption; Communication channels; Information security; Logic devices; Logic gates; Pervasive computing; Privacy; Public key; Public key cryptography; RFID tags; Radiofrequency identification;
Conference_Titel :
Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-2308-8
Electronic_ISBN :
978-1-4244-2309-5
DOI :
10.1109/CCNC.2009.4784992