Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A distributed architecture for scalable private RFID tag identification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Secured tag identification using EDSA (enhanced distributed scalable architecture)
Proceedings of the 2008 ACM symposium on Applied computing
ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Tree-based RFID authentication protocols are definitively not privacy-friendly
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
Journal of Network and Computer Applications
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A robust RFID-based method for precise indoor positioning
IEA/AIE'06 Proceedings of the 19th international conference on Advances in Applied Artificial Intelligence: industrial, Engineering and Other Applications of Applied Intelligent Systems
Hi-index | 0.00 |
There is a need for efficient communication protocols that allow the private and scalable deployment of RFID systems with a large number of tags. In this paper, we leverage the idea of using distributed, collaborative readers to identify RFID tags and propose a new probabilistic communication protocol for those readers to privately identify RFID tags more efficiently in terms of computational cost and bandwidth usage. Our protocol, which is based on hash-locks, allows readers to exchange information so as to reduce the amount of tag IDs stored in their caches. Consequently, our proposal improves the scalability of the system, and allows the easy management of large amounts of tags. We provide simulation results showing that our proposal is more efficient and flexible than previous ones in terms of computational cost and bandwidth usage.