A secure and scalable identification for hash-based RFID systems using updatable pre-computation

Yasunobu Nohara, Sozo Inoue

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper, we propose a secure identification scheme for RFID with efficient time and memory, and also an efficient update of pre-computed values on the server side. Although RFID ( Radio Frequency IDentification ) is becoming popular with pervasive computing environments, a privacy problem still remains, where an adversary can trace users' behavior by linking identification log by adversary readers. For this problem, a hash-chain scheme has been proposed as a secure identification for low-cost RFID tags, and its long identification time has been reduced by Avoine et al. using pre-computation on the server side. However, Avoine's scheme uses static pre-computation, and therefore pre-computed values include ones which are already used and no longer used. An efficient update of pre-computation is needed to remove these wasted values and this can reduce memory usage. In this paper, we optimize a lookup of pre-computed values using d-left hashing, which is a fast lookup technique, and provide efficient update of pre-computed values. We also show reasonable analytical evaluation and experimental result for memory and pre-computation/identification/update time.

Original languageEnglish
Title of host publicationWiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security
Pages65-74
Number of pages10
DOIs
Publication statusPublished - May 21 2010
Event3rd ACM Conference on Wireless Network Security, WiSec'10 - Hoboken, NJ, United States
Duration: Mar 22 2010Mar 24 2010

Publication series

NameWiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security

Other

Other3rd ACM Conference on Wireless Network Security, WiSec'10
CountryUnited States
CityHoboken, NJ
Period3/22/103/24/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'A secure and scalable identification for hash-based RFID systems using updatable pre-computation'. Together they form a unique fingerprint.

Cite this