Privacy protection for low-cost RFID tags in IoT systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.

Original languageEnglish
Title of host publicationProceedings of the 7th International Conference on Future Internet Technologies, CFI'12
Pages60-65
Number of pages6
DOIs
Publication statusPublished - 2012
Event7th International Conference on Future Internet Technologies, CFI'12 - Seoul, Korea, Republic of
Duration: 2012 Sep 112012 Sep 12

Other

Other7th International Conference on Future Internet Technologies, CFI'12
CountryKorea, Republic of
CitySeoul
Period12/9/1112/9/12

Fingerprint

Radio frequency identification (RFID)
Network protocols
Costs
Authentication
Hash functions
Internet of things
Air

Keywords

  • Low-cost RFID
  • Mutual authentication
  • Privacy protection

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Li, Y., & Teraoka, F. (2012). Privacy protection for low-cost RFID tags in IoT systems. In Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12 (pp. 60-65) https://doi.org/10.1145/2377310.2377335

Privacy protection for low-cost RFID tags in IoT systems. / Li, Ye; Teraoka, Fumio.

Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. 2012. p. 60-65.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Li, Y & Teraoka, F 2012, Privacy protection for low-cost RFID tags in IoT systems. in Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. pp. 60-65, 7th International Conference on Future Internet Technologies, CFI'12, Seoul, Korea, Republic of, 12/9/11. https://doi.org/10.1145/2377310.2377335
Li Y, Teraoka F. Privacy protection for low-cost RFID tags in IoT systems. In Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. 2012. p. 60-65 https://doi.org/10.1145/2377310.2377335
Li, Ye ; Teraoka, Fumio. / Privacy protection for low-cost RFID tags in IoT systems. Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. 2012. pp. 60-65
@inproceedings{5894887d16fb487186dc3ff5caa29fe9,
title = "Privacy protection for low-cost RFID tags in IoT systems",
abstract = "RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.",
keywords = "Low-cost RFID, Mutual authentication, Privacy protection",
author = "Ye Li and Fumio Teraoka",
year = "2012",
doi = "10.1145/2377310.2377335",
language = "English",
isbn = "9781450316903",
pages = "60--65",
booktitle = "Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12",

}

TY - GEN

T1 - Privacy protection for low-cost RFID tags in IoT systems

AU - Li, Ye

AU - Teraoka, Fumio

PY - 2012

Y1 - 2012

N2 - RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.

AB - RFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such problems, it is required that the RFID-tag should transmit its information to only legitimate readers, i.e., mutual authentication between the RFID-tag and the back-end system is required. This paper proposes a hash-function based mutual authentication protocol for low-cost RFID-tags in which calculation resources are limited. To prevent attackers eavesdropping tag's ID, randomly-picked nicknames shared between the RFID-tag and the back-end system are transmitted in the air. Simulation results show that our protocol consumes less time than a famous mutual authentication protocol, the Gossamer protocol. Security and performance analyses show that our protocol is superior to existing protocols. Thus, this paper demonstrates great potentials in the application into low-cost RFID in IoT systems.

KW - Low-cost RFID

KW - Mutual authentication

KW - Privacy protection

UR - http://www.scopus.com/inward/record.url?scp=84867705551&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867705551&partnerID=8YFLogxK

U2 - 10.1145/2377310.2377335

DO - 10.1145/2377310.2377335

M3 - Conference contribution

AN - SCOPUS:84867705551

SN - 9781450316903

SP - 60

EP - 65

BT - Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12

ER -