DocumentCode :
3122133
Title :
Cloaking RFID tags
Author :
Krier, Paul ; Seshabhattar, Sai ; Engels, Daniel ; Nair, Suku
Author_Institution :
Dept. of Comput. Sci. & Eng., Southern Methodist Univ., Dallas, TX, USA
fYear :
2011
fDate :
9-12 Jan. 2011
Firstpage :
1036
Lastpage :
1040
Abstract :
We propose two approaches to cloak RFID tags using a light-weight symmetric key algorithm called Hummingbird (HB), a state-full, rotor-based system. Deployment of Radio Frequency Identification (RFID) at the individual item level has stalled, partially due to concerns over privacy. To realize the full potential of both increased efficiency in the supply chain and promising new capabilities, RFID tags need to be pushed down beyond the cases and pallets that they are used to track now. In order to gain general acceptance, consumers must feel they have control over the tags they possess. HB has been shown to provide high security within reach of the limited resources of a tag. The proposed approaches provide for tag security by silencing a tag unless it is queried by an authenticated reader, while providing a security model that consumers will understand and with which they will feel comfortable. We conclude with a discussion of the challenges of cloaking tags and show how our protocols may be effectively applied in different environments.
Keywords :
cryptography; protocols; radiofrequency identification; telecommunication security; HB algorithm; Hummingbird algorithm; authenticated reader; cloaking RFID tags; light-weight symmetric key algorithm; protocols; radiofrequency identification; rotor-based system; supply chain; tag security; Authentication; Cryptography; Privacy; Protocols; RFID tags; Rotors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-8789-9
Type :
conf
DOI :
10.1109/CCNC.2011.5766323
Filename :
5766323
Link To Document :
بازگشت