< Back to previous page

Publication

Hierarchical ECC-Based RFID Authentication Protocol

Book Contribution - Book Chapter Conference Contribution

RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RFID readers. To tackle this problem, we introduce the concept of RFID groups and propose a hierarchical RFID authentication protocol. By using this protocol, an RFID tag can tune its identification process to the type of reader it is communicating with. Only a subset of readers can learn the identity of a particular tag, while others can only acquire information on the group to which the tag belongs. Our protocol offers impersonation resistance and is narrow-strong privacy-preserving. Furthermore, we extend the concept to multiple level of subgroups, and demonstrate the feasibility of our proposed protocols for RFID tags. © 2012 Springer-Verlag.
Book: Lecture Notes in Computer Science
Pages: 183 - 201
ISBN:978-3-642-25285-3
Publication year:2012
BOF-keylabel:yes
IOF-keylabel:yes
Authors from:Higher Education
Accessibility:Open