In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of individuals holding RFID tags. Therefore, widespread deployment of RFID systems preserving users’ privacy and data integrity is a major security challenge of the coming year. That is why research related to privacy preserving authentication is growing. And the envision is that: RFID systems can intermingle into human lives if they can offer practical, low cost and secured mechanisms for tag authentication which has been in the midst of researcher’s interest for almost a decade. One extension of RFID authentication is RFID tag searching. Any RFID authentication protocol which provides adequate security and privacy can be used for RFID tag searching. However, when the number of tags within a system will increase, the overall data collection cost will also increase. Therefore, more efficient tag searching method is needed. RFID search protocol can play a major role for tag searching which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue. In this paper we propose a lightweight and serverless RFID tag searching protocol. This protocol can search a particular tag efficiently without server’s intervention. Furthermore they are secured against major security threats.
[1]
Ari Juels,et al.
RFID security and privacy: a research survey
,
2006,
IEEE Journal on Selected Areas in Communications.
[2]
S.I. Ahamed,et al.
S3PR: Secure Serverless Search Protocols for RFID
,
2008,
2008 International Conference on Information Security and Assurance (isa 2008).
[3]
Koutarou Suzuki,et al.
Cryptographic Approach to “Privacy-Friendly” Tags
,
2003
.
[4]
Bo Sheng,et al.
Severless Search and Authentication Protocols for RFID
,
2007,
Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[5]
Philippe Oechslin,et al.
A scalable and provably secure hash-based RFID protocol
,
2005,
Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[6]
Roberto Di Pietro,et al.
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy.
,
2007,
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[7]
Gene Tsudik,et al.
YA-TRAP: yet another trivial RFID authentication protocol
,
2006,
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).