About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Workshop on Applications of Private and Anonymous Communications

Research Article

Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1145/1461464.1461467,
        author={Sepideh Fouladgar and Hossam Afifi},
        title={Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification},
        proceedings={1st International ICST Workshop on Applications of Private and Anonymous Communications},
        publisher={ACM},
        proceedings_a={AIPACA},
        year={2008},
        month={9},
        keywords={RFID Privacy Scalability},
        doi={10.1145/1461464.1461467}
    }
    
  • Sepideh Fouladgar
    Hossam Afifi
    Year: 2008
    Scalable Privacy Protecting Scheme through Distributed RFID Tag Identification
    AIPACA
    ACM
    DOI: 10.1145/1461464.1461467
Sepideh Fouladgar1,*, Hossam Afifi1,*
  • 1: Telecom SudParis 9 rue Charles Fourier 91011 Evry, France
*Contact email: sepideh.fouladgar@it-sudparis.eu, hossam.afifi@it-sudparis.eu

Abstract

Radio Frequency identification (RFID) raises privacy concerns such as malicious traceability and clandestine information collection. In this paper, we consider the need for scalable privacy protecting scheme as RFID technology will grow more prevalent. Our contribution is twofold: First we propose a lightweight privacy protecting scheme that aims at reducing the calculation burden on the back-end database. Our protocol achieves more scalable tag identification by taking advantage of the characteristics of some current RFID applications; Second, we evaluate the performance of our protocol in terms of computational load for the database and we examine how this performance varies according to applications. Moreover we analyze our protocol against various attacks and demonstrate the security of our proposed scheme.

Keywords
RFID Privacy Scalability
Published
2008-09-25
Publisher
ACM
Modified
2010-05-16
http://dx.doi.org/10.1145/1461464.1461467
Copyright © 2008–2025 ACM
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL