Secure and fast missing RFID tags identification with lightweight MAC and rateless coding

Kentaro Toyoda, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The realtime identification of missing items, e.g., valuables or confidential documents in shops and warehouses, is one of the most important system. Although many RFID-based schemes that quickly identify missing tag-attached items are proposed, most of the schemes overlooks the possibility of the internal crime. If a person controls an untrusted reader, he/she can freely forge responses from tags and steal items without being detected. In this paper, we propose a secure and fast missing tags identification against both the internal and external attackers. Our scheme first identifies tags stolen by an external attacker with a channel estimation based scheme. Then, our scheme lets tags send cryptographically generated responses, which are socalled MAC (Message Authentication Code), and verifies them to identify stolen tags by an internal attacker. In order to shorten the time to collect responses, our scheme lets multiple tags transmit responses simultaneously and decodes them by leveraging the estimated channels. By the security analysis and the computer simulation, we show the effectiveness of our scheme.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Communication Workshop, ICCW 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2659-2664
Number of pages6
ISBN (Print)9781467363051
DOIs
Publication statusPublished - 2015 Sept 8
EventIEEE International Conference on Communication Workshop, ICCW 2015 - London, United Kingdom
Duration: 2015 Jun 82015 Jun 12

Other

OtherIEEE International Conference on Communication Workshop, ICCW 2015
Country/TerritoryUnited Kingdom
CityLondon
Period15/6/815/6/12

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secure and fast missing RFID tags identification with lightweight MAC and rateless coding'. Together they form a unique fingerprint.

Cite this