Title
On refresh-based tag identification schemes
Abstract
We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.
Year
DOI
Venue
2010
10.1109/CCNC.2009.4784992
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Keywords
Field
DocType
rfid application,hidden adversarial communication channel,refresh-based tag identification scheme,refresh approach,pervasive computing environment,encryption technique,tag capability,refresh technique,insubvertible encryption,tag identification scheme,communication channels,privacy,cryptography,public key,security,ubiquitous computing,data privacy,algorithm design and analysis,pervasive computing
Identification scheme,Algorithm design,Computer science,Cryptography,Computer network,Encryption,Ubiquitous computing,Information privacy,Public-key cryptography,Privacy software,Distributed computing
Conference
Citations 
PageRank 
References 
0
0.34
7
Authors
1
Name
Order
Citations
PageRank
Jihoon Cho172.40