Scalable RFID systems: A privacy-preserving protocol with constant-time identification

Basel Alomair, Andrew Clark, Jorge Cuellar, Radha Poovendran

Research output: Contribution to journalArticlepeer-review

43 Scopus citations

Abstract

In RFID literature, most privacy-preserving protocols require the reader to search all tags in the system in order to identify a single tag. In another class of protocols, the search complexity is reduced to be logarithmic in the number of tags, but it comes with two major drawbacks: it requires a large communication overhead over the fragile wireless channel, and the compromise of a tag in the system reveals secret information about other, uncompromised, tags in the same system. In this work, we take a different approach to address time complexity of private identification in large-scale RFID systems. We utilize the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFID systems with constant-time identification. Instead of increasing communication overhead, the existence of a large storage device in RFID systems, the database, is utilized for improving the time efficiency of tag identification.

Original languageEnglish
Article number6095531
Pages (from-to)1536-1550
Number of pages15
JournalIEEE Transactions on Parallel and Distributed Systems
Volume23
Issue number8
DOIs
StatePublished - 2012

Keywords

  • authentication
  • identification
  • privacy
  • RFID
  • scalability

Fingerprint

Dive into the research topics of 'Scalable RFID systems: A privacy-preserving protocol with constant-time identification'. Together they form a unique fingerprint.

Cite this