A new framework for privacy of RFID path authentication

RFID-based path authentication enables supply chain managers to verify the exact path that a tag has taken. In this paper, we introduce a new oracle Move that models a tag's movement along a designed or an arbitrary path in a supply chain. With this oracle, we refine the existing security and p...

全面介紹

Saved in:
書目詳細資料
Main Authors: CAI, Shaoying, DENG, Robert H., LI, Yingjiu, ZHAO, Yunlei
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2012
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/1650
https://ink.library.smu.edu.sg/context/sis_research/article/2649/viewcontent/ACNS_75.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:RFID-based path authentication enables supply chain managers to verify the exact path that a tag has taken. In this paper, we introduce a new oracle Move that models a tag's movement along a designed or an arbitrary path in a supply chain. With this oracle, we refine the existing security and privacy notions for RFID-based path authentication. In addition, we propose a new privacy notion, called path privacy, for RFID-based path authentication. Our privacy notion captures the privacy of both tag identity and path information in a single game. Compared to existing two-game based privacy notions, it is more rigorous, powerful, and concise. We also construct a new path authentication scheme. Our scheme does not require the entities in a supply chain to have any connection with each other except in the initial stage. It requires only 480 bits storage and no computational ability on each tag; thus it can be deployed on the standard EPCglobal Class 1 Generation 2 tags in the market.