Mechanism on RFID tag privacy information coordination protection

Jiujun Cheng*, Cheng Cheng, Kuifei Yu, Antti Ylä-Jääski, Zhong Li, Hao Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

1 Citation (Scopus)


RFID system is facing the serious problems of private security, which mainly consists of the leakage of tag sensitive information, tracking and monitoring spitefully the carrier of mobile tag. This paper constructs a coordination protection mechanism of tag private information by a variety of reader-writer, which solves the two questions mentioned above. Firstly, a trust-security mechanism used to ensure that the readers in system are trustful. Next, via intercommunication of the readers, the secret key, which is produced by the tag-charged reader, is divided and distributed to the various readers in system. The test result shows that attackers cannot gain the shared secret key from various readers, and he/she could only read an encoded data, thus the security of private information in tag is guaranteed. Additionally, a set of readers use coordination-protection mechanism, which is an efficient way to improve the expandability of the system.

Original languageEnglish
Title of host publicationIndustrial Instrumentation and Control Systems
Number of pages6
Publication statusPublished - 2013
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Measurement, Instrumentation and Automation - Guangzhou, China
Duration: 15 Sep 201216 Sep 2012

Publication series

NameApplied Mechanics and Materials
ISSN (Print)16609336
ISSN (Electronic)16627482


ConferenceInternational Conference on Measurement, Instrumentation and Automation
Abbreviated titleICMIA


  • Coordination protection
  • RFID
  • Shamir(t,w)
  • Threshold mode


Dive into the research topics of 'Mechanism on RFID tag privacy information coordination protection'. Together they form a unique fingerprint.

Cite this