Title :
Quantifying Information Leakage in RFID Systems
Author_Institution :
Sch. of Inf. Sci. & Eng., Univ. of Canberra, Canberra, ACT
Abstract :
Radio frequency identification (RFID) systems provide large scale, automated tracking solutions and superior reliability over existing tracking systems as well as the possibility of authentication, but also pose a threat to customer privacy, which already drew great attentions from researchers in this field. In this paper the quantifying information leakage in RFID systems will be first investigated via the Shannon\´s information theory, and the analysis results are also extended from binary to r-ary coding systems. The secondary contribution of this paper is that based on the first part discussion a modified "hash-chain" protocol is presented that decreasing the heavy burden on back- end database to authenticate tags, which the normal hash-chain protocol computes hash function many times on every tag.
Keywords :
cryptographic protocols; message authentication; radio tracking; radiofrequency identification; RFID systems; Shannon´s information theory; authentication; automated tracking solutions; back- end database; customer privacy; hash-chain protocol; quantifying information leakage; radio frequency identification; Authentication; Cryptographic protocols; Data security; Databases; Privacy; Protection; Public key; Public key cryptography; RFID tags; Radiofrequency identification; RFID; cryptographic approach; hash function; information leakage;
Conference_Titel :
Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
Conference_Location :
Gangwon-Do
Print_ISBN :
978-89-5519-136-3
DOI :
10.1109/ICACT.2008.4493717