By Topic

Analyzing Security of RFID Tag Reading Protocols Based on Binary Tree Traversal

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

Blocker tags have been designed to enhance the privacy that users of RFID tags wish to preserve. To realize when and how well the new protective instruments perform, this investigation conducts simulation experiments to address two research problems. One finding reveals that blocker tags offer different levels of protection to tags associated with different leaf nodes in the binary tree. Besides, another finding confirms the potential of a new attack in which an attacker could exclusively read tag data while preventing the data requests from legal readers. Both analysis results suggest that high-risk items be placed in the right half of the tree.

Published in:

Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE

Date of Conference:

9-12 Dec. 2008