Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification

  • Authors:
  • Basel Alomair;Andrew Clark;Jorge Cuellar;Radha Poovendran

  • Affiliations:
  • King Abdulaziz City for Science and Technology (KACST), Riyadh;University of Washington, Seattle;Corporate Research and Technologies, CT T DE IT1, CERT, Munich;Unversity of Washington, Seattle

  • Venue:
  • IEEE Transactions on Parallel and Distributed Systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In RFID literature, most “privacy-preserving” protocols require the reader to search all tags in the system in order to identify a single tag. In another class of protocols, the search complexity is reduced to be logarithmic in the number of tags, but it comes with two major drawbacks: it requires a large communication overhead over the fragile wireless channel, and the compromise of a tag in the system reveals secret information about other, uncompromised, tags in the same system. In this work, we take a different approach to address time complexity of private identification in large-scale RFID systems. We utilize the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFID systems with constant-time identification. Instead of increasing communication overhead, the existence of a large storage device in RFID systems, the database, is utilized for improving the time efficiency of tag identification.