scholarly journals Privacy Enhancing Techniques on RFID systems

Author(s):  
Masataka Suzuki ◽  
Kazukuni Kobar

2019 ◽  
Vol 14 ◽  
Author(s):  
Khaleel Ahmad ◽  
Afsar Kamal

Background: Privacy enhancing techniques are developed in order to provide strong protection to cyberspace. These techniques aim to allow users to keep their identities hidden during the communication when they are sending email, making payments online, browsing the Web or posting to newsgroups. MixNet is the most practical solution for concealing identities of message and sender’s identities. Objective: It provides sender and receiver anonymity as well as message security. The main goal of MixNet is to overcome vulnerability and enhance the performance of communication. It can efficiently handle the messages of various length and produce desirable results with privacy. The main objective of this paper is to acquire information and concepts regarding MixNet. We also provide guidelines for future research and references. Methods : The designing of MixNet depends on what cryptosystem method is used. Symmetric and Asymmetric both are used. Other methods could be also used such as PIR, CSP and FDR model, RPC, Token-based approach or others. Result: In this paper we provide an overview of MixNet approaches and presented a survey on MixNet based techniques and different models. We also constructed the comparison tables as per our requirements for better understanding. For this purpose, we found a total of 120 articles related to the MixNet published between 1990 and 2018 from the most relevant scientific resources. However, only 86 papers were analyzed due to comprehensiveness and relevancy to this article. Conclusion: Focused on the security and privacy of communication and how it can be achieved. This survey also reveals research progress and research gap on MixNet.



Author(s):  
Honglong Chen ◽  
Xin Ai ◽  
Kai Lin ◽  
Na Yan ◽  
Zhibo Wang ◽  
...  




Author(s):  
Jiaqi Xu ◽  
Wei Sun ◽  
Kannan Srinivasan

RFID techniques have been extensively used in sensing systems due to their low cost. However, limited by the structural simplicity, collision is one key issue which is inevitable in RFID systems, thus limiting the accuracy and scalability of such sensing systems. Existing anti-collision techniques try to enable parallel decoding without sensing based applications in mind, which can not operate on COTS RFID systems. To address the issue, we propose COFFEE, which enables parallel channel estimation of COTS passive tags by harnessing the collision. We revisit the physical layer design of current standard. By exploiting the characteristics of low sampling rate and channel diversity of RFID tags, we separate the collided data and extract the channels of the collided tags. We also propose a tag identification algorithm which explores history channel information and identify the tags without decoding. COFFEE is compatible with current COTS RFID standards which can be applied to all RFID-based sensing systems without any modification on tag side. To evaluate the real world performance of our system, we build a prototype and conduct extensive experiments. The experimental results show that we can achieve up to 7.33x median time resolution gain for the best case and 3.42x median gain on average.



Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.



2021 ◽  
Vol 22 (3) ◽  
pp. 46-56
Author(s):  
Georg Saxl ◽  
Lukas Goertschacher ◽  
Thomas Ussmueller ◽  
Jasmin Grosinger


Author(s):  
Kai Lin ◽  
Honglong Chen ◽  
Na Yan ◽  
Zhe Li ◽  
Junjian Li ◽  
...  
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document