TY - JOUR
T1 - Scalable RFID systems
T2 - A privacy-preserving protocol with constant-time identification
AU - Alomair, Basel
AU - Clark, Andrew
AU - Cuellar, Jorge
AU - Poovendran, Radha
PY - 2012
Y1 - 2012
N2 - In RFID literature, most privacy-preserving protocols require the reader to search all tags in the system in order to identify a single tag. In another class of protocols, the search complexity is reduced to be logarithmic in the number of tags, but it comes with two major drawbacks: it requires a large communication overhead over the fragile wireless channel, and the compromise of a tag in the system reveals secret information about other, uncompromised, tags in the same system. In this work, we take a different approach to address time complexity of private identification in large-scale RFID systems. We utilize the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFID systems with constant-time identification. Instead of increasing communication overhead, the existence of a large storage device in RFID systems, the database, is utilized for improving the time efficiency of tag identification.
AB - In RFID literature, most privacy-preserving protocols require the reader to search all tags in the system in order to identify a single tag. In another class of protocols, the search complexity is reduced to be logarithmic in the number of tags, but it comes with two major drawbacks: it requires a large communication overhead over the fragile wireless channel, and the compromise of a tag in the system reveals secret information about other, uncompromised, tags in the same system. In this work, we take a different approach to address time complexity of private identification in large-scale RFID systems. We utilize the special architecture of RFID systems to propose a symmetric-key privacy-preserving authentication protocol for RFID systems with constant-time identification. Instead of increasing communication overhead, the existence of a large storage device in RFID systems, the database, is utilized for improving the time efficiency of tag identification.
KW - authentication
KW - identification
KW - privacy
KW - RFID
KW - scalability
UR - http://www.scopus.com/inward/record.url?scp=84863515660&partnerID=8YFLogxK
U2 - 10.1109/TPDS.2011.290
DO - 10.1109/TPDS.2011.290
M3 - Article
AN - SCOPUS:84863515660
SN - 1045-9219
VL - 23
SP - 1536
EP - 1550
JO - IEEE Transactions on Parallel and Distributed Systems
JF - IEEE Transactions on Parallel and Distributed Systems
IS - 8
M1 - 6095531
ER -