• DocumentCode
    1909976
  • Title

    ACTION: Breaking the Privacy Barrier for RFID Systems

  • Author

    Lu, Li ; Han, Jinsong ; Xiao, Renyi ; Liu, Yunhao

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Hong Kong Univ. of Sci. & Technol., Hong Kong
  • fYear
    2009
  • fDate
    19-25 April 2009
  • Firstpage
    1953
  • Lastpage
    1961
  • Abstract
    In order to protect privacy, radio frequency identification (RFID) systems employ privacy-preserving authentication (PPA) to allow valid readers to explicitly authenticate their dominated tags without leaking private information. Typically, an RF tag sends an encrypted message to the reader, then the reader searches for the key that can decrypt the cipher to identify the tag. Due to the large-scale deployment of today´s RFID systems, the key search scheme for any PPA requires a short response time. Previous designs construct balance-tree based key management structures to accelerate the search speed to 0(logN), where N is the number of tags. Being efficient, such approaches are vulnerable to compromising attacks. By capturing a small number of tags, compromising attackers are able to identify other tags that have not been corrupted. To address this issue, we propose an Anti- Compromising authenticaTION protocol, ACTION, which employs a novel sparse tree architecture, such that the key of every tag is independent from one another. The advantages of this design include: 1) resilience to the compromising attack, 2) reduction of key storage for tags from 0(logN) to 0(1), which is significant for resource critical tag devices, and 3) high search efficiency, which is 0(logN), as good as the best in the previous designs.
  • Keywords
    cryptography; data privacy; message authentication; radiofrequency identification; trees (mathematics); ACTION; Anti- Compromising authenticaTION protocol; RF tag; RFID systems; balance-tree based key management structures; dominated tags; encrypted message; privacy barrier; privacy protection; privacy-preserving authentication; private information; radio frequency identification systems; short response time; sparse tree architecture; Acceleration; Authentication; Cryptography; Delay; Large-scale systems; Privacy; Protection; Protocols; Radio frequency; Radiofrequency identification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM 2009, IEEE
  • Conference_Location
    Rio de Janeiro
  • ISSN
    0743-166X
  • Print_ISBN
    978-1-4244-3512-8
  • Electronic_ISBN
    0743-166X
  • Type

    conf

  • DOI
    10.1109/INFCOM.2009.5062117
  • Filename
    5062117