S-search: finding RFID tags using scalable and secure search protocol

Massively deploying RFID systems that preserve data integrity and security is a major challenge of the coming years. Since RFID tags are extremely constrained in time and space, enforcing high level of security with excessive cryptographic computation is not possible. Secured mechanisms for tag authentication have been in the midst of researcher's interest for almost a decade. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. And tag searching need to be scalable as RFID tags are deployed comprehensively within a system. In this paper we propose a scalable and lightweight RFID tag searching protocol. This protocol can search a particular tag efficiently as the approach is not based on exhaustive search. This approach does not employ extreme computing or cryptographic functions. Our proposed scalable search protocol is secured against major security threats and it is suitable to be used in numerous real life situations.

[1]  Ivan Stojmenovic,et al.  A hybrid randomized protocol for RFID tag identification , 2006 .

[2]  S.I. Ahamed,et al.  S3PR: Secure Serverless Search Protocols for RFID , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[3]  F. Schoute,et al.  Dynamic Frame Length ALOHA , 1983, IEEE Trans. Commun..

[4]  Bo Sheng,et al.  Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[5]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[6]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[7]  D. R. Hush,et al.  Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[8]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[9]  Harald Vogt,et al.  Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.

[10]  Bo Sheng,et al.  Finding popular categories for RFID tags , 2008, MobiHoc '08.

[11]  Anthony Ephremides,et al.  An exact analysis and performance evaluation of framed ALOHA with capture , 1989, IEEE Trans. Commun..

[12]  J.D. Sandoval,et al.  Mathematical model for a multiread anticollision protocol , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).

[13]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[14]  Chae-Woo Lee,et al.  An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[15]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[16]  Roberto Di Pietro,et al.  RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[17]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[18]  Jae-Hyun Kim,et al.  Fast wireless anti-collision algorithm in ubiquitous ID system , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[19]  Israel Cidon,et al.  Conflict multiplicity estimation and batch resolution algorithms , 1988, IEEE Trans. Inf. Theory.

[20]  Jae-Hyun Kim,et al.  Novel Anti-collision Algorithms for Fast Object Identification in RFID System , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[21]  Francesca Lonetti,et al.  Tree slotted aloha: a new protocol for tag identification in RFID networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[22]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[23]  Norman Abramson,et al.  The ALOHA System-Another Alternative for Computer Communications , 1899 .

[24]  Bob Metcalfe,et al.  Steady-state analysis of a slotted and controlled Aloha system with blocking , 1975, CCRV.