Skip to main navigation Skip to search Skip to main content

CRFID: An RFID system with a cloud database as a back-end server

  • Shuai Min Chen
  • , Mu En Wu
  • , Hung Min Sun*
  • , King Hang Wang
  • *Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

19 Citations (Scopus)

Abstract

Radio-frequency identification (RFID) systems can benefit from cloud databases since information on thousands of tags is queried at the same time. If all RFID readers in a system query a cloud database, data consistency can easily be maintained by cloud computing. Privacy-preserving authentication (PPA) has been proposed to protect RFID security. The time complexity for searching a cloud database in an RFID system is O(N), which is obviously inefficient. Fortunately, PPA uses tree structures to manage tags, which can reduce the complexity from a linear search to a logarithmic search. Hence, tree-based PPA provides RFID scalability. However, in tree-based mechanisms, compromise of a tag may cause other tags in the system to be vulnerable to tracking attacks. Here we propose a secure and efficient privacy-preserving RFID authentication protocol that uses a cloud database as an RFID server. The proposed protocol not only withstands desynchronizing and tracking attacks, but also provides scalability with O(logN) search complexity.

Original languageEnglish
Pages (from-to)155-161
Number of pages7
JournalFuture Generation Computer Systems
Volume30
Issue number1
Early online date4 Jun 2013
DOIs
Publication statusPublished - Jan 2014

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure

User-Defined Keywords

  • Cloud computing
  • Cryptography
  • Desynchronizing attack
  • Privacy
  • Remote accessibility
  • RFID
  • Security
  • Tracking attack

Fingerprint

Dive into the research topics of 'CRFID: An RFID system with a cloud database as a back-end server'. Together they form a unique fingerprint.

Cite this