Abstract
Privacy is a major concern with RFID tags and many solutions have been proposed. As many approach requires secure hash function on each tag, cost of tags imposed by those solutions is significantly high for wide development. We propose a protocol that uses pre-calculated Bloom filter to send tag identity for increased privacy with little additional cost per tag. In our approach, secure hash function calculation is done in tag production phase and each tag does not have any hash functions. Instead, each tag must have random number generator and volatile memory.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Sarma, S., Brock, D.L., Ashton, K.: The networked physical world. Technical Report MIT-AUTOID-WH-001, MIT Auto-ID Center (2000)
Sarma, S.: Towards the 5c tag. Technical Report MIT-AUTOID-WH-006, MIT Auto-ID Center (2001)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: Selective blocking of rfid tags for consumer privacy. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 103–111. ACM Press, New York (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to a privacy friendly tag. In: RFID Privacy Workshop. MIT, Cambridge (2003)
Broder, A., Mitzenmacher, M.: Network applications of bloom filters: A survey. In: Proceedings of the 40th Annual Allerton Conference on Communication, Control, and Computing (2002)
Finkenzeller, K.: RFID-Handbook, 2nd edn. Wiley & Sons, Ltd, Chichester (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Doi, Y., Wakayama, S., Ishiyama, M., Ozaki, S., Inoue, A. (2005). Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042_39
Download citation
DOI: https://doi.org/10.1007/11596042_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30803-4
Online ISBN: 978-3-540-32296-2
eBook Packages: Computer ScienceComputer Science (R0)