Intactness verification in anonymous RFID systems

Kai Bu, Jia Liu, Bin Xiao, Xuan Liu, Shigeng Zhang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

3 Citations (Scopus)

Abstract

Radio-Frequency Identification (RFID) technology has fostered many object monitoring systems. Along with this trend, tagged objects' value and privacy become a primary concern. A corresponding important problem is to verify the intactness of a set of tagged objects without leaking tag identifiers (IDs). However, existing solutions necessitate the knowledge of tag IDs. Without tag IDs as a priori, this paper studies intactness verification in anonymous RFID systems. We identify three critical solution requirements, that is, deterministic verification, anonymity preservation, and scalability. We propose Cardiff and Divar, two crypto-free, lightweight protocols that isolate tag IDs from intactness verification and satisfy solution requirements. Cardiff explores tag cardinality as intactness proof while Divar leverages Direct-Sequence Spread Spectrum (DSSS) enabled RFID. Both analytical and simulation results demonstrate that Cardiff and Divar can satisfy the requirements of accuracy, privacy, and scalability.
Original languageEnglish
Title of host publication2014 20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014 - Proceedings
PublisherIEEE Computer Society
Pages134-141
Number of pages8
Volume2015-April
ISBN (Electronic)9781479976157
DOIs
Publication statusPublished - 1 Jan 2014
Event20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014 - Hsinchu, Taiwan
Duration: 16 Dec 201419 Dec 2014

Conference

Conference20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014
Country/TerritoryTaiwan
CityHsinchu
Period16/12/1419/12/14

Keywords

  • Anonymous RFID system
  • Intactness verification
  • Missing-tag detection
  • Privacy
  • Security

ASJC Scopus subject areas

  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Intactness verification in anonymous RFID systems'. Together they form a unique fingerprint.

Cite this