Security analysis of an RFID tag search protocol

2016 ◽  
Vol 116 (10) ◽  
pp. 618-622 ◽  
Author(s):  
Hoda Jannati ◽  
Behnam Bahrak
2013 ◽  
Vol 684 ◽  
pp. 531-534 ◽  
Author(s):  
Yun Tian ◽  
Gong Liang Chen ◽  
Jian Hua Li

Radio frequency identification (RFID) has been applied to a variety of domains. RFID tag search problem becomes significant when the total number of tags is very large and only the data of a particular tag or a small group of tags are required. This paper proposes a lightweight serverless RFID tag search protocol in conformity with EPC C1G2 standards. The computation operations in the protocol are only PRNG and XOR. The security analysis shows that the protocol achieves authentication, data confidentiality, untraceability and data integrity.


2010 ◽  
Vol 15 (9) ◽  
pp. 109-117
Author(s):  
Hyun-Woo Choi ◽  
Don-Gu Yeo ◽  
Jae-Hoon Jang ◽  
Heung-Youl Youm
Keyword(s):  
Rfid Tag ◽  

2011 ◽  
Vol 8 (2) ◽  
pp. 50-56 ◽  
Author(s):  
Ji Young Chun ◽  
Jung Yeon Hwang ◽  
Dong Hoon Lee
Keyword(s):  
Rfid Tag ◽  

2014 ◽  
Vol 6 (1) ◽  
pp. 31-49
Author(s):  
Teemu Väisänen ◽  
Matti Ritamäki ◽  
Johan Scholliers ◽  
Sirra Toivonen

Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 599
Author(s):  
Ji Young Chun ◽  
Geontae Noh

The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology. In particular, an RFID tag search system has been designed to find a particular tag in a group of tags using a mobile reader. Unfortunately, privacy infringement and availability issues in the search system have not been adequately addressed to date. In this paper, we propose a novel RFID tag search protocol that will enhance mobile reader user privacy while being able to operate under conditions of unstable connection to a central server. First, the proposed protocol preserves the privacy of mobile reader users. The privacy of the mobile reader user is at risk because the signal strength emitted from a mobile reader is much stronger than that from the tag, exposing the location of the mobile reader user and thus compromising the user’s privacy. Thus far, such privacy issues have been overlooked. The second issue is presented because of wireless connections that are either unreliable or too remote, causing a mobile reader to disconnect from the central server. The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader. In unstable environments, the protocol can successfully locate specific tags without any server.


Sign in / Sign up

Export Citation Format

Share Document