RFID tag search protocol preserving privacy of mobile reader holders

23Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

RFID tag search system which is used to find specific tags has many applications such as inventory management, supply chain, and search for books in the library. Recently, secure serverless search protocols using mobile readers are proposed in the environment where a persistent connection between mobile readers and a backend server cannot be guaranteed. However, the protocols are insecure against replay attacks and breach the privacy of mobile reader holders. In this paper, we point out the vulnerabilities of the previous protocols and propose an RFID tag search protocol which protects the privacy of mobile reader holders. Our protocol is secure against all known major attacks in RFID systems. © IEICE 2011.

Cite

CITATION STYLE

APA

Chun, J. Y., Hwang, J. Y., & Lee, D. H. (2011). RFID tag search protocol preserving privacy of mobile reader holders. IEICE Electronics Express, 8(2), 50–56. https://doi.org/10.1587/elex.8.50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free