A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Quantitative evaluation of unlinkable ID matching schemes
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Secured tag identification using EDSA (enhanced distributed scalable architecture)
Proceedings of the 2008 ACM symposium on Applied computing
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Scalable privacy protecting scheme through distributed RFID tag identification
Proceedings of the workshop on Applications of private and anonymous communications
A RFID architecture framework for global supply chain applications
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Wireless Personal Communications: An International Journal
Microdata protection through approximate microaggregation
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Secure and scalable RFID authentication protocol
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Leveraging communication information among readers for RFID data cleaning
WAIM'11 Proceedings of the 12th international conference on Web-age information management
A review of RFID technology and its managerial applications in different industries
Journal of Engineering and Technology Management
Extended system design for RFID enabled supply chains with non-RFID technologies
International Journal of Business Information Systems
Hi-index | 0.00 |
The fast growth of Radio Frequency IDentification (RFID) implies a deployment challenge, namely how to keep this technology scalable without renouncing security and privacy features. This paper focuses on combining tag privacy and scalability using the hash locks mechanism. Our contribution is twofold: (i) a cell-based architecture is proposed in which the readers co-operate in order to conduct tag identification in a private and scalable way; (ii) a communication protocol for the proposed architecture is defined and assessed. The proposed architecture and protocol solve the scalability shortcomings of private RFID identification pointed out by Juels and Weis.