DocumentCode :
3028884
Title :
Protect mobile RFID location privacy using dynamic identity
Author :
Hour Yang, Ming ; Wu, Jain-shing ; Chen, Shih-Jen
Author_Institution :
Inf. Comput. Sci., Chung Yuan Christian Univ., Chungli
fYear :
2008
fDate :
14-16 Aug. 2008
Firstpage :
366
Lastpage :
374
Abstract :
To protect data and location privacy of an RFID user, the transmitted sensitive information of RIFD tags must be encrypted and unpredictable. The previous approaches to protect user privacy for RFID are classified into authentication-based schemes, encryption-based schemes, and dynamic identity schemes. However, authentication-based schemes are easily broken. Because low-cost RFID tags are not tamper-resistant, the key for the authentication protocol cannot be well protected. Encryption-based schemes can protect data privacy but location privacy is still vulnerable due to fixed cipertext. Although dynamic identity schemes have chance to overcome the previous problems, but dynamic identity schemes are limited by exhaustive search problem. And, the cost of RFID tags is very limited. In this paper, we proposed a lightweight dynamic identity based RFID authentication scheme to protect both data privacy and location privacy. And we use the GNY logic analysis to show the proposed scheme can against threats of replay attacks, spoofing, man-in-the-middle, and message loss.
Keywords :
data privacy; message authentication; radiofrequency identification; GNY logic analysis; RFID authentication scheme; data privacy; lightweight dynamic identity; mobile RFID location privacy; Authentication; Costs; Cryptography; Data privacy; Identity-based encryption; Protection; Protocols; RFID tags; Radiofrequency identification; Search problems; GNY logic; RFID; replay attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cognitive Informatics, 2008. ICCI 2008. 7th IEEE International Conference on
Conference_Location :
Stanford, CA
Print_ISBN :
978-1-4244-2538-9
Type :
conf
DOI :
10.1109/COGINF.2008.4639190
Filename :
4639190
Link To Document :
بازگشت