A Lightweight Serverless RFID Tag Search Protocol

Article Preview

Abstract:

Radio frequency identification (RFID) has been applied to a variety of domains. RFID tag search problem becomes significant when the total number of tags is very large and only the data of a particular tag or a small group of tags are required. This paper proposes a lightweight serverless RFID tag search protocol in conformity with EPC C1G2 standards. The computation operations in the protocol are only PRNG and XOR. The security analysis shows that the protocol achieves authentication, data confidentiality, untraceability and data integrity.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

531-534

Citation:

Online since:

April 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C. C. Tan, B. Sheng and Q. Li: Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 2008, 7(4): 1400-1407.

DOI: 10.1109/twc.2008.061012

Google Scholar

[2] T. Y. Won, J. Y. Chun and D. H. Lee: Strong authentication protocol for secure RFID tag search without help of central database. In Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008, pp.153-158.

DOI: 10.1109/euc.2008.54

Google Scholar

[3] M. E. Hoque, F. Rahman, S. I. Ahamed and J. H. Park: Enhancing privacy and security of RFID systems with serverless authentication and search protocols in pervasive environments. Wireless Personal Communications, 2010, 55(1): 65-79.

DOI: 10.1007/s11277-009-9786-0

Google Scholar

[4] Y. Zuo: Secure and private search protocols for RFID systems. Information Systems Frontiers, 2010, 12(5): 507-519.

DOI: 10.1007/s10796-009-9208-6

Google Scholar

[5] S. Piramuthu: Vulnerabilities of RFID protocols proposed in ISF. Information Systems Frontiers, 2012, 14(3): 647-651.

DOI: 10.1007/s10796-010-9291-8

Google Scholar