Privacy-Preserving RFID-Based Search System
نویسندگان
چکیده
The employment of mobile readers (or phone collaborated with a Radio frequency identification (RFID) reader) opens novel application for RFID technology. In particular, an tag search system has been designed to find particular in group tags using reader. Unfortunately, privacy infringement and availability issues the have not adequately addressed date. this paper, we propose protocol that will enhance reader user while being able operate under conditions unstable connection central server. First, proposed preserves users. is at risk because signal strength emitted from much stronger than tag, exposing location thus compromising user’s privacy. Thus far, such overlooked. second issue presented wireless connections are either unreliable or too remote, causing disconnect enables serverless searches passive tags, which obtain operating power environments, can successfully locate specific without any
منابع مشابه
Privacy-enhanced RFID Tag Search System
Radio frequency identification (RFID) technology is used to identify RFID-tagged objects automatically. An RFID system generally consists of three components: an RFID tag, an RFID reader, and a backend system. An RFID tag is a small device for identification, which is attached to or embedded in an object. It has an unique identifier and may optionally hold additional product information for the...
متن کاملPreserving Privacy in RFID Deployment
Radio Frequency Identification, RFID, is an item-tagging technology which interests suppliers and retailers. RFID has potential to revolutionise supply chain management but also some potentially distressing social implications. When used inappropriately, RFID is capable of reducing or eliminating customer anonymity, thereby damaging privacy and threatening civil liberties. I begin with an intro...
متن کاملPrivacy-Preserving ECC-Based Grouping Proofs for RFID
The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags are potentially untrusted. In this paper, we extend this concept and propose a narrowstrong privacy-preserving RFID grouping proof and demonstrate that it can easily be extended to use cases with more than two tags, ...
متن کاملWide-Weak Privacy-Preserving RFID Authentication Protocols
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Cryptographic techniques are commonly used to enable tag-to-server authentication while protecting privacy. Unfortunately, these algorithms and their corresponding implementations are difficult to adapt to the extreme conditions implied by the use of RFID. The extremely limited budget for energy and a...
متن کاملPrivacy-Preserving Authorized RFID Authentication Protocols
Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10050599