Abstract
RFID tag search system which is used to find specific tags has many applications such as inventory management, supply chain, and search for books in the library. Recently, secure serverless search protocols using mobile readers are proposed in the environment where a persistent connection between mobile readers and a backend server cannot be guaranteed. However, the protocols are insecure against replay attacks and breach the privacy of mobile reader holders. In this paper, we point out the vulnerabilities of the previous protocols and propose an RFID tag search protocol which protects the privacy of mobile reader holders. Our protocol is secure against all known major attacks in RFID systems. © IEICE 2011.
Author supplied keywords
Cite
CITATION STYLE
Chun, J. Y., Hwang, J. Y., & Lee, D. H. (2011). RFID tag search protocol preserving privacy of mobile reader holders. IEICE Electronics Express, 8(2), 50–56. https://doi.org/10.1587/elex.8.50
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.