DocumentCode :
3116174
Title :
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory
Author :
Jen-Chun Chang ; Hsin-Lung Wu ; Daqiang Zhang
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nation Taipei Univ., Taipei, Taiwan
fYear :
2013
fDate :
18-21 Dec. 2013
Firstpage :
613
Lastpage :
618
Abstract :
We study hash-based identification protocols in RFID systems which obtain privacy against active adversaries who can perform compromised attacks. Here, an active adversary can track a tag via successful or unsuccessful identifications with legal or illegal readers. In IEEE Transactions on Parallel and Distributed Systems, Alomair, Clark, Cuellar and Poovendran propose a novel hash-based RFID identification protocol called constant-time-identification protocol (CTI). Their protocol is provably against active adversaries who can perform compromise attack. However, in order to obtain high privacy in their protocol, the database in CTI is required to have quite large memory space. In this work, we try to reduce the memory complexity of the database in CTI while preserving the same level of privacy. We discover that there is a large gap between tag´s identification time and tag´s response time in the protocol CTI. We trade-off tag identification time for the sake of reducing the memory space. By using the well-known time-memory-trade-off techniques, we can obtain this goal. With a performance analysis, we show that the memory space of our modified protocol can be reduced by a factor t compared to that of CTI where the number of hash operations for one tag´s identification is O(t^2). Via a case study, we show that our modified protocol is able to save about 89% fraction of memory space of CTI in some practical setting of RFID systems while increasing the tag identification time.
Keywords :
cryptographic protocols; radiofrequency identification; CTI protocols; RFID protocols; compromise attack; constant time identification protocols; hash-based identification protocols; memory complexity; privacy preserving protocols; tag identification time; tag response time; time memory trade off techniques; Complexity theory; Databases; Privacy; Protocols; Radiation detectors; Radiofrequency identification; Time factors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC)
Conference_Location :
Vietri sul Mere
Print_ISBN :
978-1-4799-2481-3
Type :
conf
DOI :
10.1109/UIC-ATC.2013.92
Filename :
6726268
Link To Document :
بازگشت