Kaya, Selim Volkan and Savaş, Erkay and Levi, Albert and Erçetin, Özgür (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks, 7 (1). pp. 136-152. ISSN 1570-8705
This is the latest version of this item.
MS Word
MultiContext_RFID_Framework_journal.doc
Restricted to Repository staff only
Download (294kB) | Request a copy
MultiContext_RFID_Framework_journal.doc
Restricted to Repository staff only
Download (294kB) | Request a copy
PDF
Public_key.pdf
Download (2MB)
Public_key.pdf
Download (2MB)
Official URL: http://dx.doi.org/10.1016/j.adhoc.2007.12.004
Abstract
In this paper, We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy as one of the most important design issues and show that an infrastructure for multi-purpose RFID tags to be used in different contexts can be implemented in a privacy preserving manner. We address security attacks such as cryptanalytic, impersonation, tracking, replay, and relay and show that the protocols used in the proposed infrastructure are secure against them. We also introduce a new angle to privacy in RFID systems by presenting spatio-temporal attacks as an important threat against privacy. We propose a methodology to thwart or alleviate these kinds of attacks. We develop our multi-context RFID infrastructure relying on usage of public key cryptography (PKC), which presents more scalable solutions in the sense that the backend servers can identify the tags approximately 57 times (est.) faster than the best symmetric cipher based systems when there are a million tags in the system. We demonstrate that our infrastructure is feasible even with passive class 2 RFID tags and that the requirements for PKC are comparable to those other cryptographic implementations based on symmetric ciphers proposed for RFID use.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | RFID, privacy, security, public key cryptography, spatio-temporal attacks |
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware Q Science > QA Mathematics > QA075 Electronic computers. Computer science Q Science > QA Mathematics > QA076 Computer software |
Divisions: | Faculty of Engineering and Natural Sciences > Academic programs > Telecommunications Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng. Faculty of Engineering and Natural Sciences |
Depositing User: | Özgür Erçetin |
Date Deposited: | 06 Nov 2008 20:37 |
Last Modified: | 22 May 2019 12:16 |
URI: | https://research.sabanciuniv.edu/id/eprint/10110 |
Available Versions of this Item
-
Privacy-Aware Multi-Context RFID Infrastructure using Public Key Cryptography. (deposited 31 Oct 2007 01:01)
-
Privacy-Aware Multi-Context RFID Infrastructure using Public Key Cryptography. (deposited 31 Oct 2008 09:05)
- Public key cryptography based privacy preserving multi-context RFID infrastructure. (deposited 06 Nov 2008 20:37) [Currently Displayed]
-
Privacy-Aware Multi-Context RFID Infrastructure using Public Key Cryptography. (deposited 31 Oct 2008 09:05)