A Simple Delegation Scheme for RFID Systems (SiDeS)

Many privacy protecting schemes for RFID (radio frequency identification) technology assume that reading devices (readers) have continuous connectivity with a centralised online database in charge of the identification of a certain amount of tags. However such centralised models can raise scalability and latency problems. Moreover, they are not suitable in applications where connectivity is intermittent. In this paper, we introduce SiDeS (simple delegation scheme), a protocol that allows a centralised database to delegate temporarily and in a secure manner, the capability to identify tags, to readers. SiDeS not only requires simple cryptography functions like XOR, hash functions and random number generator but also manages tags ownership transfer.

[1]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[2]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[3]  Kaan Yuksel,et al.  Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications , 2004 .

[4]  David A. Wagner,et al.  A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..

[5]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[6]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[7]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[9]  Philippe Oechslin,et al.  Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.