Quantifying Information Leakage in RFID Systems

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

3 Citations (Scopus)
23 Downloads (Pure)

Abstract

Radio frequency identification (RFID) systems provide large scale, automated tracking solutions and superior reliability over existing tracking systems as well as the possibility of authentication, but also pose a threat to customer privacy, which already drew great attentions from researchers in this field. In this paper the quantifying information leakage in RFID systems will be first investigated via the Shannon's information theory, and the analysis results are also extended from binary to r-ary coding systems. The secondary contribution of this paper is that based on the first part discussion a modified "hash-chain" protocol is presented that decreasing the heavy burden on back- end database to authenticate tags, which the normal hash-chain protocol computes hash function many times on every tag.
Original languageEnglish
Title of host publicationIEEE International Conference on Advanced Communication Technology
EditorsDr Hyeoug-Ho Leei
Place of PublicationKorea
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages84-89
Number of pages6
Volume1
ISBN (Print)9788955191356, 9788955191363
DOIs
Publication statusPublished - 2008
EventIEEE 10th International Conference on Advanced Communication Technology - Phoenix Park, Korea, Republic of
Duration: 17 Feb 200820 Feb 2008

Conference

ConferenceIEEE 10th International Conference on Advanced Communication Technology
Country/TerritoryKorea, Republic of
CityPhoenix Park
Period17/02/0820/02/08

Fingerprint

Dive into the research topics of 'Quantifying Information Leakage in RFID Systems'. Together they form a unique fingerprint.

Cite this