Quantifying Information Leakage in RFID Systems

Xu Huang

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    3 Citations (Scopus)

    Abstract

    Radio frequency identification (RFID) systems provide large scale, automated tracking solutions and superior reliability over existing tracking systems as well as the possibility of authentication, but also pose a threat to customer privacy, which already drew great attentions from researchers in this field. In this paper the quantifying information leakage in RFID systems will be first investigated via the Shannon's information theory, and the analysis results are also extended from binary to r-ary coding systems. The secondary contribution of this paper is that based on the first part discussion a modified "hash-chain" protocol is presented that decreasing the heavy burden on back- end database to authenticate tags, which the normal hash-chain protocol computes hash function many times on every tag.
    Original languageEnglish
    Title of host publicationIEEE International Conference on Advanced Communication Technology
    EditorsDr Hyeoug-Ho Leei
    Place of PublicationKorea
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages84-89
    Number of pages6
    Volume1
    ISBN (Print)9788955191356, 9788955191363
    DOIs
    Publication statusPublished - 2008
    EventIEEE 10th International Conference on Advanced Communication Technology - Phoenix Park, Korea, Republic of
    Duration: 17 Feb 200820 Feb 2008

    Conference

    ConferenceIEEE 10th International Conference on Advanced Communication Technology
    CountryKorea, Republic of
    CityPhoenix Park
    Period17/02/0820/02/08

    Fingerprint

    Radio frequency identification (RFID)
    Hash functions
    Information theory
    Authentication
    Large scale systems

    Cite this

    Huang, X. (2008). Quantifying Information Leakage in RFID Systems. In D. H-H. Leei (Ed.), IEEE International Conference on Advanced Communication Technology (Vol. 1, pp. 84-89). Korea: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICACT.2008.4493717
    Huang, Xu. / Quantifying Information Leakage in RFID Systems. IEEE International Conference on Advanced Communication Technology. editor / Dr Hyeoug-Ho Leei. Vol. 1 Korea : IEEE, Institute of Electrical and Electronics Engineers, 2008. pp. 84-89
    @inproceedings{c63cf27f426e48b8935109368ba82eb4,
    title = "Quantifying Information Leakage in RFID Systems",
    abstract = "Radio frequency identification (RFID) systems provide large scale, automated tracking solutions and superior reliability over existing tracking systems as well as the possibility of authentication, but also pose a threat to customer privacy, which already drew great attentions from researchers in this field. In this paper the quantifying information leakage in RFID systems will be first investigated via the Shannon's information theory, and the analysis results are also extended from binary to r-ary coding systems. The secondary contribution of this paper is that based on the first part discussion a modified {"}hash-chain{"} protocol is presented that decreasing the heavy burden on back- end database to authenticate tags, which the normal hash-chain protocol computes hash function many times on every tag.",
    author = "Xu Huang",
    year = "2008",
    doi = "10.1109/ICACT.2008.4493717",
    language = "English",
    isbn = "9788955191356",
    volume = "1",
    pages = "84--89",
    editor = "Leei, {Dr Hyeoug-Ho}",
    booktitle = "IEEE International Conference on Advanced Communication Technology",
    publisher = "IEEE, Institute of Electrical and Electronics Engineers",
    address = "United States",

    }

    Huang, X 2008, Quantifying Information Leakage in RFID Systems. in DH-H Leei (ed.), IEEE International Conference on Advanced Communication Technology. vol. 1, IEEE, Institute of Electrical and Electronics Engineers, Korea, pp. 84-89, IEEE 10th International Conference on Advanced Communication Technology, Phoenix Park, Korea, Republic of, 17/02/08. https://doi.org/10.1109/ICACT.2008.4493717

    Quantifying Information Leakage in RFID Systems. / Huang, Xu.

    IEEE International Conference on Advanced Communication Technology. ed. / Dr Hyeoug-Ho Leei. Vol. 1 Korea : IEEE, Institute of Electrical and Electronics Engineers, 2008. p. 84-89.

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    TY - GEN

    T1 - Quantifying Information Leakage in RFID Systems

    AU - Huang, Xu

    PY - 2008

    Y1 - 2008

    N2 - Radio frequency identification (RFID) systems provide large scale, automated tracking solutions and superior reliability over existing tracking systems as well as the possibility of authentication, but also pose a threat to customer privacy, which already drew great attentions from researchers in this field. In this paper the quantifying information leakage in RFID systems will be first investigated via the Shannon's information theory, and the analysis results are also extended from binary to r-ary coding systems. The secondary contribution of this paper is that based on the first part discussion a modified "hash-chain" protocol is presented that decreasing the heavy burden on back- end database to authenticate tags, which the normal hash-chain protocol computes hash function many times on every tag.

    AB - Radio frequency identification (RFID) systems provide large scale, automated tracking solutions and superior reliability over existing tracking systems as well as the possibility of authentication, but also pose a threat to customer privacy, which already drew great attentions from researchers in this field. In this paper the quantifying information leakage in RFID systems will be first investigated via the Shannon's information theory, and the analysis results are also extended from binary to r-ary coding systems. The secondary contribution of this paper is that based on the first part discussion a modified "hash-chain" protocol is presented that decreasing the heavy burden on back- end database to authenticate tags, which the normal hash-chain protocol computes hash function many times on every tag.

    U2 - 10.1109/ICACT.2008.4493717

    DO - 10.1109/ICACT.2008.4493717

    M3 - Conference contribution

    SN - 9788955191356

    SN - 9788955191363

    VL - 1

    SP - 84

    EP - 89

    BT - IEEE International Conference on Advanced Communication Technology

    A2 - Leei, Dr Hyeoug-Ho

    PB - IEEE, Institute of Electrical and Electronics Engineers

    CY - Korea

    ER -

    Huang X. Quantifying Information Leakage in RFID Systems. In Leei DH-H, editor, IEEE International Conference on Advanced Communication Technology. Vol. 1. Korea: IEEE, Institute of Electrical and Electronics Engineers. 2008. p. 84-89 https://doi.org/10.1109/ICACT.2008.4493717