TY - JOUR
T1 - A novel coding scheme for secure communications in distributed RFID systems
AU - Sakai, Kazuya
AU - Sun, Min Te
AU - Ku, Wei Shinn
AU - Lai, Ten H.
N1 - Publisher Copyright:
© 1968-2012 IEEE.
PY - 2016/2/1
Y1 - 2016/2/1
N2 - Privacy protection is the primary concern when RFID applications are deployed in our daily lives. Due to the computational power constraints of passive tags, non-encryption-based singulation protocols have been recently developed, in which wireless jamming is used. However, the existing private tag access protocols without shared secrets rely on impractical physical layer assumptions, and thus they are difficult to deploy. To tackle this issue, we first redesign the architecture of RFID system by dividing an RF reader into two different devices, an RF activator and a trusted shield device (TSD). Then, we propose a novel coding scheme, namely Random Flipping Random Jamming (RFRJ), to protect tags' content. Unlike the past work, the proposed singulation protocol utilizes only the physical layer techniques that are already implemented. Analyses and simulation results validate our distributed architecture with the RFRJ coding scheme, which defends tags' privacy against various adversaries including the random guessing attack, correlation attack, ghost-and-leech attack, and eavesdropping.
AB - Privacy protection is the primary concern when RFID applications are deployed in our daily lives. Due to the computational power constraints of passive tags, non-encryption-based singulation protocols have been recently developed, in which wireless jamming is used. However, the existing private tag access protocols without shared secrets rely on impractical physical layer assumptions, and thus they are difficult to deploy. To tackle this issue, we first redesign the architecture of RFID system by dividing an RF reader into two different devices, an RF activator and a trusted shield device (TSD). Then, we propose a novel coding scheme, namely Random Flipping Random Jamming (RFRJ), to protect tags' content. Unlike the past work, the proposed singulation protocol utilizes only the physical layer techniques that are already implemented. Analyses and simulation results validate our distributed architecture with the RFRJ coding scheme, which defends tags' privacy against various adversaries including the random guessing attack, correlation attack, ghost-and-leech attack, and eavesdropping.
KW - RFID security
KW - coding
KW - privacy
UR - http://www.scopus.com/inward/record.url?scp=84962052448&partnerID=8YFLogxK
U2 - 10.1109/TC.2015.2423671
DO - 10.1109/TC.2015.2423671
M3 - 期刊論文
AN - SCOPUS:84962052448
SN - 0018-9340
VL - 65
SP - 409
EP - 421
JO - IEEE Transactions on Computers
JF - IEEE Transactions on Computers
IS - 2
M1 - 7087362
ER -