Randomized Skip Lists-based private authentication for large-scale RFID systems

Kazuya Sakai, Min Te Sun, Wei Shinn Ku, Ten H. Lai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

The performance of key authentication and the degree of privacy in large-scale RFID systems are considered by many researchers as tradeoffs. Based on how keys are managed in the system, the privacy preserving tag authentications proposed in the past can be categorized into tree-based and group-based approaches. While a tree-based approach achieves high performance in key authentication, it suffers from the issue of low privacy should a fraction of tags be compromised. On the contrary, while group-based key authentication is relatively invulnerable to compromise attacks, it is not scalable to the large number of tags. In this paper, we propose a new private tag authentication protocol based on skip lists, named Randomized Skip Lists-based Authentication. Without sacrificing the authentication performance, our scheme provides a strong privacy preserving mechanism.

Original languageEnglish
Title of host publicationMobiHoc 2013 - Proceedings of the 14th ACM International Symposium on Mobile Ad Hoc Networking and Computing
Pages277-280
Number of pages4
DOIs
StatePublished - 2013
Event14th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2013 - Bangalore, India
Duration: 29 Jul 20131 Aug 2013

Publication series

NameProceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)

Conference

Conference14th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2013
Country/TerritoryIndia
CityBangalore
Period29/07/131/08/13

Keywords

  • Authentication
  • Privacy
  • RFID

Fingerprint

Dive into the research topics of 'Randomized Skip Lists-based private authentication for large-scale RFID systems'. Together they form a unique fingerprint.

Cite this