Tag Content Access Control with Identity-based Key Exchange

Liang Yan; Rong, Chunming
September 2010
AIP Conference Proceedings;9/30/2010, Vol. 1281 Issue 1, p297
Conference Proceeding
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.


Related Articles

  • Integrating Wireless Sensors and RFID Tags into Energy-Efficient and Dynamic Context Networks. Tomás Sánchez López; Daeyoung Kim; Gonzalo Huerta Canepa; Koudjo Koumadi // Computer Journal;Mar2009, Vol. 52 Issue 2, p240 

    Context-aware systems have traditionally used distributed sensors to gather context information. The unique identity provided by radio frequency identification (RFID) tags could provide additional information to the sensor data. However, the task of matching identity and sensor information in...

  • Mutual Authentication Protocol with Ownership Transfer. Leian Liu; Zhiqiang Chen; Juan Zou; Ling Yang; Yuli Shen // International Journal of Digital Content Technology & its Applic;Apr2012, Vol. 6 Issue 7, p58 

    In recent years, along with the extensive applications of RFID technology, RFID security and privacy issues have become the hotspot of research. During the whole life of an RFID tag, its owners may change many times. The privacy of its old owners and new owners must be protected, which is called...

  • Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems. Guo Yimin; Li Shundong; Dou Jiawei; Zhou Sufang // IET Information Security;2016, Vol. 10 Issue 1, p28 

    Tag cloning attack is a serious threat to the radio-frequency identification (RFID) applications. Cloned tags detection is an effective security mechanism to prevent the attacks. To improve the accuracy and efficiency of detection for cloned tags, this study presents a deterministic cloned tags...

  • A Privacy-preserving RFID Authenticate Protocols against Man-in-the-middle Attacks. Xiuqing Chen; Tianjie Cao; Qiao Yu // Advances in Information Sciences & Service Sciences;Mar2013, Vol. 5 Issue 5, p588 

    Radio Frequency Identification (RFID) is a technology designed to automatically identify a myriad of everyday objects and people. Due to widely spread of the RFID applications, some useful message can be attacked by adversaries. Thus, to eliminate the security problem, the security requirements...

  • A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography. Ya-li Liu; Xiao-lin Qin; Chao Wang; Bo-han Li // Journal of Computers;Nov2013, Vol. 8 Issue 11, p2880 

    The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we propose a robust authentication protocol based on Elliptic Curve Cryptography (ECC), which meets the requirement of resource-limited RFID...

  • Getting Around the Technical Issues with Battery-Assisted UHF RFID Tags. Müller, Simon // Wireless Design & Development;Feb2008, Vol. 16 Issue 2, p28 

    The article focuses on the technical issues with battery-assisted ultra-high frequency radio-frequency identification tags. According to the author, battery-assisted passive (BAP) tags replete the gap between purely passive tags and the more costly active tags. Since BAP tags do not actively...

  • X-CleLo: intelligent deterministic RFID data and event transformer. Darcy, Peter; Stantic, Bela; Sattar, Abdul // Personal & Ubiquitous Computing;Mar2012, Vol. 16 Issue 3, p259 

    Recently, passive Radio Frequency Identification (RFID) systems have received an increased amount of attention as researchers have worked to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data...

  • Execution Time Analysis of a Gen-2 Remote Computer. Ogirala, Ajay; Murari, Archana; Hawrylak, Peter; Mickle, Marlin // Computer Technology & Application;2011, Vol. 2 Issue 2, p94 

    The communication in the physical layer between an interrogator and a tag of a passive Radio Frequency Identification (RFID) system operating between 860-960 MHz is defined by the Gen 2 protocol. The tag can be considered a remote executing unit or a computer that executes instructions from the...

  • The Five Stage RFID. Blanchard, David // Industry Week/IW;Jan2009, Vol. 258 Issue 1, p50 

    The article focuses on the concept of radio frequency identification (RFID). These were synonymous with retail giant Wal-Mart's RFID initiatives. RFID has the notoriety of being both a mature technology and an emerging technology (most of the current interest among manufacturers dates back only...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics