Abstract | ||
---|---|---|
We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/CCNC.2009.4784992 | CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference |
Keywords | Field | DocType |
rfid application,hidden adversarial communication channel,refresh-based tag identification scheme,refresh approach,pervasive computing environment,encryption technique,tag capability,refresh technique,insubvertible encryption,tag identification scheme,communication channels,privacy,cryptography,public key,security,ubiquitous computing,data privacy,algorithm design and analysis,pervasive computing | Identification scheme,Algorithm design,Computer science,Cryptography,Computer network,Encryption,Ubiquitous computing,Information privacy,Public-key cryptography,Privacy software,Distributed computing | Conference |
Citations | PageRank | References |
0 | 0.34 | 7 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jihoon Cho | 1 | 7 | 2.40 |