Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062117
|View full text |Cite
|
Sign up to set email alerts
|

ACTION: Breaking the Privacy Barrier for RFID Systems

Abstract: Abstract-In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their dominated tags without leaking private information. Typically, an RF tag sends an encrypted message to the reader, then the reader searches for the key that can decrypt the cipher to identify the tag. Due to the large-scale deployment of today's RFID systems, the key search scheme for any PPA requires a short response time. Pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(26 citation statements)
references
References 20 publications
0
26
0
Order By: Relevance
“…Private preserving authentication (PPA) protocols [1], [2], [6], [7], [8], [9], [12], [14], [21] are such a type of protocols that allow a legal reader to authenticate the validity of a tag with privacy protection. In these protocols, a reader interacts with a tag in a three-round interaction to authenticate it.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Private preserving authentication (PPA) protocols [1], [2], [6], [7], [8], [9], [12], [14], [21] are such a type of protocols that allow a legal reader to authenticate the validity of a tag with privacy protection. In these protocols, a reader interacts with a tag in a three-round interaction to authenticate it.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we compare the communication efficiency of three phase-detector, multi round-checker and two types of privacy-preserving protocols: LAST [21] and ACTION [1] by simulation. In the current literature, also various privacy-preserving protocols have been proposed, many of them are shown to be insecure or cannot provide enough security properties in the subsequent works.…”
Section: Performance Analysismentioning
confidence: 99%
“…The typical applications of RFID technology include inventory management, real-time monitoring, etc. Recently, the RFID technology has also found new applications in location discovery [1], [2], popular items identification [3], traffic tracking [4], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Lu [10] proposed SPA protocol which implements tag ID update in this type of protocol. In [11], Lu further improved this protocol via utilizing spare tree structure to break the connection of IDs among each tag. These works mainly focus on how to protect the privacy and security of individual communication, which means providing a security tunnel between the reader and the tag.…”
Section: Introductionmentioning
confidence: 99%