Privacy protection for low-cost RFID tags in IoT systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.

Original languageEnglish
Title of host publicationProceedings of the 7th International Conference on Future Internet Technologies, CFI'12
Pages60-65
Number of pages6
DOIs
Publication statusPublished - 2012
Event7th International Conference on Future Internet Technologies, CFI'12 - Seoul, Korea, Republic of
Duration: 2012 Sept 112012 Sept 12

Publication series

NameProceedings of the 7th International Conference on Future Internet Technologies, CFI'12

Other

Other7th International Conference on Future Internet Technologies, CFI'12
Country/TerritoryKorea, Republic of
CitySeoul
Period12/9/1112/9/12

Keywords

  • Low-cost RFID
  • Mutual authentication
  • Privacy protection

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Privacy protection for low-cost RFID tags in IoT systems'. Together they form a unique fingerprint.

Cite this