Privacy threats in RFID group proof schemes

Hyoung Min Ham, Joo Seok Song

Research output: Contribution to journalArticle

Abstract

RFID tag is a small and inexpensive microchip which is capable of transmitting unique identifier through wireless network in a short distance. If a group of RFID tags can be scanned simultaneously by one reader, RFID Group proof could be generated. Group proof can be used in various applications, such as good management which is usually achieved using barcode system. A lot of RFID group proof schemes have been proposed by many researchers. In this paper, we introduce some existing group proof schemes and then analyze their vulnerabilities to the privacy. Moreover, we propose a new attack model, which threats the privacy of user by tracking tags in a group.

Original languageEnglish
Pages (from-to)336-341
Number of pages6
JournalWorld Academy of Science, Engineering and Technology
Volume36
Publication statusPublished - 2009 Dec 1

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Privacy threats in RFID group proof schemes'. Together they form a unique fingerprint.

  • Cite this