The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan. (2013 vol.62)
pp: 112-123
Kazuya Sakai , Ohio State University, Columbus
Wei-Shinn Ku , Auburn University, Auburn
Roger Zimmermann , National University of Singapore, Singapore
Min-Te Sun , National Central University, Jhongli
ABSTRACT
Today Radio Frequency Identification (RFID) technologies are applied in many fields for a variety of applications. Though bringing great productivity gains, RFID systems may cause new security and privacy threats to individuals or organizations. Therefore, it is important to protect the security of RFID systems and the privacy of RFID tag owners. Unfortunately, none of the existing solutions provide a complete defense against eavesdroppers who could monitor the communication between RFID readers and tags and recover the contents of tags. Based on our research, we propose two novel RFID backward channel protection protocols, namely dynamic bit encoding and optimized dynamic bit encoding. Our schemes are able to achieve high anonymity with limited communication overhead. Our extensive simulations show that both proposed schemes provide much stronger backward channel protection than existing techniques. In addition, analytical models were created and validated through comparisons with simulation results.
INDEX TERMS
Encoding, Radiofrequency identification, Protocols, Privacy, Hamming weight, Correlation, Security, bit encoding, Radio frequency identification, privacy protection
CITATION
Kazuya Sakai, Wei-Shinn Ku, Roger Zimmermann, Min-Te Sun, "Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel", IEEE Transactions on Computers, vol.62, no. 1, pp. 112-123, Jan. 2013, doi:10.1109/TC.2011.248
REFERENCES
[1] R. Ahlswede, N. Cai, S.-Y. R. Li, and R.W. Yeung, “Network Information Flow,” IEEE Trans. Information Theory, vol. 46, no. 4, pp. 1204-1216, July 2000.
[2] C. Castelluccia and G. Avoine, “Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags,” Proc. Int'l Conf. Smart Card Research and Advanced Applications, pp. 289-299, 2006.
[3] W. Choi and B. hee Roh, “Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms,” Proc. IEEE Int'l Conf. Computational Science and Applications, pp. 279-287, 2006.
[4] W. Choi, M. Yoon, and B. hee Roh, “Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy,” IEICE Trans. Comm., vol. 91, no. 1, pp. 172-182, 2008.
[5] H.K.H. Chow, K. Lun Choy, W.B. Lee, and K.C. Lau, “Design of a RFID Case-Based Resource Management System for Warehouse Operations,” Expert Systems Applications, vol. 30, no. 4, pp. 561-576, 2006.
[6] C. Diaz, S. Seys, J. Claessens, and B. Preneel, “Towards Measuring Anonymity,” Proc. Privacy Enhancing Technologies Workshop (PET), 2002.
[7] T. Dimitriou, “A Secure and Efficient RFID Protocol that Could Make Big Brother (Partially) Obsolete,” Proc. Fourth Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 269-275, 2006.
[8] EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Comm. at 860MHz-960MHz, version 1.0.9, EPCglobal, 2006.
[9] S.L. Garfinkel, A. Juels, and R. Pappu, “RFID Privacy: An Overview of Problems and Proposed Solutions,” IEEE Security and Privacy, vol. 3, no. 3, pp. 34-43, May/June 2005.
[10] D.C. Hankerson, G. Hoffman, D.A. Leonard, C.C. Lindner, K.T. Phelps, C.A. Rodger, and J.R. Wall, Coding Theory and Cryptography: The Essentials. Marcel Dekker, 2000.
[11] C. Huang and H. Min, “A New Method of Synchronization for RFID Digital Receivers,” Proc. Int'l Conf. Solid-State and Integrated Circuit Technology (ICSICT '06), pp. 1595-1597, 2006.
[12] R. Jain, J. Radhakrishnan, and P. Sen, “Privacy and Interaction in Quantum Communication Complexity and a Theorem about the Relative Entropy of Quantum States,” Proc. IEEE Symp. Foundations of Computer Science (FOCS), pp. 429-438, 2002.
[13] A. Juels, “Minimalist Cryptography for Low-Cost RFID Tags,” Proc. Int'l Conf. Security in Comm. Networks (SCN), pp. 149-164, 2004.
[14] A. Juels, “RFID Security and Privacy: A Research Survey,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006.
[15] A. Juels, R. Pappu, and B. Parno, “Unidirectional Key Distribution across Time and Space with Applications to RFID Security,” Proc. USENIX Security Symp., pp. 75-90, 2008.
[16] A. Juels, P. Syverson, and D. Bailey, “High-Power Proxies for Enhancing RFID Privacy and Utility,” Proc. Workshop Privacy Enhancing Technologies (PET), 2005.
[17] Y. Li and X. Ding, “Protecting RFID Communications in Supply Chains,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 234-241, 2007.
[18] T.-L. Lim, T. Li, and S.-L. Yeo, “Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems,” Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 40-49, 2008.
[19] L. Lu, J. Han, L. Hu, Y. Liu, and L.M. Ni, “Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems,” Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), pp. 13-22, 2007.
[20] R. Metcalfe and D. Boggs, “Ethernet: Distributed Packet Switching for Local Computer Networks,” Comm. ACM, vol. 19, no. 7, pp. 395-404, 1976.
[21] J. Myung, W. Lee, J. Srivastava, and T.K. Shih, “Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification,” IEEE Trans. Parallel Distributed System, vol. 18, no. 6, pp. 763-775, June 2007.
[22] M. Ohkubo, K. Suzuki, and S. Kinoshita, “RFID Privacy Issues and Technical Challenges,” Comm. ACM, vol. 48, no. 9, pp. 66-71, 2005.
[23] M.R. Rieback, B. Crispo, and A.S. Tanenbaum, “Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags,” Proc. Security Protocols Workshop, pp. 51-59, 2005.
[24] B.L. Dos Santos and L.S. Smith, “RFID in the Supply Chain: Panacea or Pandora's Box?,” Comm. ACM, vol. 51, no. 10, pp. 127-131, 2008.
[25] S.E. Sarma, S.A. Weis, and D.W. Engels, “RFID Systems and Security and Privacy Implications,” Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 454-469, 2002.
[26] A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity,” Proc. Privacy Enhancing Technologies Workshop (PET), 2002.
[27] C.E. Shannon and W. Weaver, The Mathematical Theory of Communication. Univ. of Illinois Press, 1998.
[28] S. Spiekermann and S. Evdokimov, “Critical RFID Privacy-Enhancing Technologies,” IEEE Security & Privacy, vol. 7, no. 2, pp. 56-62, Mar./Apr. 2009.
[29] R. Want, “The Magic of RFID,” ACM Queue, vol. 2, no. 7, pp. 40-48, 2004.
[30] S.A. Weis, “Security and Privacy in Radio-Frequency Identification Devices,” master's thesis, Massachusetts Inst. of Tech nology, 2005.
[31] S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Proc. Int'l Conf. Security in Pervasive Computing, pp. 201-212, 2003.
[32] S. Zhang, S.C. Liew, and P.P. Lam, “Hot Topic: Physical-Layer Network Coding,” Proc. MobiCOM, pp. 358-365, 2006.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool