TY - GEN
T1 - A secure and scalable identification for hash-based RFID systems using updatable pre-computation
AU - Nohara, Yasunobu
AU - Inoue, Sozo
PY - 2010/5/21
Y1 - 2010/5/21
N2 - In this paper, we propose a secure identification scheme for RFID with efficient time and memory, and also an efficient update of pre-computed values on the server side. Although RFID ( Radio Frequency IDentification ) is becoming popular with pervasive computing environments, a privacy problem still remains, where an adversary can trace users' behavior by linking identification log by adversary readers. For this problem, a hash-chain scheme has been proposed as a secure identification for low-cost RFID tags, and its long identification time has been reduced by Avoine et al. using pre-computation on the server side. However, Avoine's scheme uses static pre-computation, and therefore pre-computed values include ones which are already used and no longer used. An efficient update of pre-computation is needed to remove these wasted values and this can reduce memory usage. In this paper, we optimize a lookup of pre-computed values using d-left hashing, which is a fast lookup technique, and provide efficient update of pre-computed values. We also show reasonable analytical evaluation and experimental result for memory and pre-computation/identification/update time.
AB - In this paper, we propose a secure identification scheme for RFID with efficient time and memory, and also an efficient update of pre-computed values on the server side. Although RFID ( Radio Frequency IDentification ) is becoming popular with pervasive computing environments, a privacy problem still remains, where an adversary can trace users' behavior by linking identification log by adversary readers. For this problem, a hash-chain scheme has been proposed as a secure identification for low-cost RFID tags, and its long identification time has been reduced by Avoine et al. using pre-computation on the server side. However, Avoine's scheme uses static pre-computation, and therefore pre-computed values include ones which are already used and no longer used. An efficient update of pre-computation is needed to remove these wasted values and this can reduce memory usage. In this paper, we optimize a lookup of pre-computed values using d-left hashing, which is a fast lookup technique, and provide efficient update of pre-computed values. We also show reasonable analytical evaluation and experimental result for memory and pre-computation/identification/update time.
UR - http://www.scopus.com/inward/record.url?scp=77952382134&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77952382134&partnerID=8YFLogxK
U2 - 10.1145/1741866.1741878
DO - 10.1145/1741866.1741878
M3 - Conference contribution
AN - SCOPUS:77952382134
SN - 9781605589237
T3 - WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security
SP - 65
EP - 74
BT - WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security
T2 - 3rd ACM Conference on Wireless Network Security, WiSec'10
Y2 - 22 March 2010 through 24 March 2010
ER -