RFID Readers Deployment for Scalable Identification of Private Tags

  • Solanas A
  • Manjón J
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Scalability is frequently used as a magic incantation to indicate that something is badly designed or broken. Often you hear in a discussion "but that doesn't scale" as the magical word to end an argument. Werner Vogels CTO-Amazon.com Abstract The deployment of the RFID technology can put the privacy of its users in jeopardy. With the aim of averting the fears of the RFID potential users, a plethora of security and privacy methods have been designed. However, due to the important growth of this technology, scalability problems have arisen and the proper deployment of the technology has become a challenge. In this chapter, we provide a brief overview of the most relevant methods for providing security and privacy to the users of the RFID technology. We pay a special attention to the hash locks proposal and we recall a method based on the distribution of RFID readers, with the aim to provide security and privacy in a scalable fashion. In order to test our method, we have developed a simulator that is presented in this chapter. By using this simulator we study the distribution of several kinds of readers on a variety of scenarios, and we report some of the obtained results.

Cite

CITATION STYLE

APA

Solanas, A., & Manjón, J. (2008). RFID Readers Deployment for Scalable Identification of Private Tags. In RFID Security (pp. 289–314). Springer US. https://doi.org/10.1007/978-0-387-76481-8_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free