Abstract
Radio frequency identification (RFID) systems provide large scale, automated tracking solutions and superior reliability over existing tracking systems as well as the possibility of authentication, but also pose a threat to customer privacy, which already drew great attentions from researchers in this field. In this paper the quantifying information leakage in RFID systems will be first investigated via the Shannon's information theory, and the analysis results are also extended from binary to r-ary coding systems. The secondary contribution of this paper is that based on the first part discussion a modified "hash-chain" protocol is presented that decreasing the heavy burden on back- end database to authenticate tags, which the normal hash-chain protocol computes hash function many times on every tag.
Original language | English |
---|---|
Title of host publication | IEEE International Conference on Advanced Communication Technology |
Editors | Dr Hyeoug-Ho Leei |
Place of Publication | Korea |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 84-89 |
Number of pages | 6 |
Volume | 1 |
ISBN (Print) | 9788955191356, 9788955191363 |
DOIs | |
Publication status | Published - 2008 |
Event | IEEE 10th International Conference on Advanced Communication Technology - Phoenix Park, Korea, Republic of Duration: 17 Feb 2008 → 20 Feb 2008 |
Conference
Conference | IEEE 10th International Conference on Advanced Communication Technology |
---|---|
Country/Territory | Korea, Republic of |
City | Phoenix Park |
Period | 17/02/08 → 20/02/08 |