Title :
A Hybrid RFID Protocol against Tracking Attacks
Author :
Chang, Jen-Chun ; Wu, Hsin-Lung
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Taipei Univ., Taipei, Taiwan
Abstract :
We study the problem how to construct an RFID mutual authentication protocol between tags and readers. Juels (in Journal on Selected Areas in Communications, 2006) proposed an open question which asks whether there exists a fully privacy-preserving RFID authentication protocol in which the time complexity of a successful authentication phase can be done in sub-linear time o(n) where n is the number of tags participating in the RFID system. In this work, we answer this question positively in an amortized view. Precisely, we design a fully privacy-preserving protocol in which the amortized cost of a successful authentication phase only requires time O(n3/4). In addition, our protocol is a hybrid from the randomized hash lock scheme of Weis et. al., the hash chain scheme of Ohkubo et. al., and the efficient identification scheme of Dimitriou. We combine them delicately to obtain the desired authentication protocol.
Keywords :
computational complexity; cryptographic protocols; data privacy; message authentication; radiofrequency identification; hash chain scheme; hybrid privacy-preserving RFID mutual authentication protocol; identification scheme; randomized hash lock scheme; time complexity; tracking attack; Authentication; Computer science; Concatenated codes; Costs; Data privacy; Databases; Protocols; Radio frequency; Radiofrequency identification; Signal processing; RFID; authentication; privacy; traceability;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09. Fifth International Conference on
Conference_Location :
Kyoto
Print_ISBN :
978-1-4244-4717-6
Electronic_ISBN :
978-0-7695-3762-7
DOI :
10.1109/IIH-MSP.2009.140