RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of a protocol, denoted as unp-...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/491 http://dx.doi.org/10.1145/1653662.1653670 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1490 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-14902016-05-13T05:29:30Z RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction MA, Changshe LI, Yingjiu DENG, Robert H. LI, Tieyan Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of a protocol, denoted as unp-privacy. In this paper, the definition of unp-privacy is refined and the relation between the two notions is clarified: it is proven that ind-privacy is weaker than unp-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp-privacy is determined. It is shown that if an RFID system has strong (or weak) unpprivacy then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with strong (or weak) unp-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag’s computational power for enforcing strong RFID system privacy. Finally, a new RFID protocol is proposed to satisfy the minimal requirement, which also outperforms the state-of-the-art RFID protocols in terms of computational cost and communication overhead. 2009-11-01T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/491 info:doi/10.1145/1653662.1653670 http://dx.doi.org/10.1145/1653662.1653670 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University RFID privacy pseudorandom function Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
RFID privacy pseudorandom function Information Security |
spellingShingle |
RFID privacy pseudorandom function Information Security MA, Changshe LI, Yingjiu DENG, Robert H. LI, Tieyan RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction |
description |
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of a protocol, denoted as unp-privacy. In this paper, the definition of unp-privacy is refined and the relation between the two notions is clarified: it is proven that ind-privacy is weaker than unp-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp-privacy is determined. It is shown that if an RFID system has strong (or weak) unpprivacy then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with strong (or weak) unp-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag’s computational power for enforcing strong RFID system privacy. Finally, a new RFID protocol is proposed to satisfy the minimal requirement, which also outperforms the state-of-the-art RFID protocols in terms of computational cost and communication overhead. |
format |
text |
author |
MA, Changshe LI, Yingjiu DENG, Robert H. LI, Tieyan |
author_facet |
MA, Changshe LI, Yingjiu DENG, Robert H. LI, Tieyan |
author_sort |
MA, Changshe |
title |
RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction |
title_short |
RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction |
title_full |
RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction |
title_fullStr |
RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction |
title_full_unstemmed |
RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction |
title_sort |
rfid privacy: relation between two notions, minimal condition, and efficient construction |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2009 |
url |
https://ink.library.smu.edu.sg/sis_research/491 http://dx.doi.org/10.1145/1653662.1653670 |
_version_ |
1770570441195257856 |