Download now Free registration required
RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization. Existing tracking architecture usually assumes the use of a trusted server which is invulnerable to compromise by internal and external adversaries. However, maintaining such a trusted server is unlikely in the real world. In this paper, the authors consider the problem of adding privacy protection to object tracking systems built upon passive RFID tags, without relying on a trusted server assumption. The protocol continues to protect user privacy in the event of partial compromise of a server.
- Format: PDF
- Size: 173.6 KB