A New Object Searching Protocol for Multi-tag RFID, by Subhasish Dhal and Indranil Sengupta
Searching an object from a large set is a tedious task. Radio Frequency IDentification (RFID) technology helps us to search the desired object efficiently. In this technology, a small chip called RFID tag, that contains the identification information about an object is attached to the same object. In general, a set of objects are attached with RFID tags. To find out a particular object preserving the possible security requirements, the RFID reader requests the tag in desired object to respond with its encrypted identification information. Since there is a response only from the tag in desired object the adversary gets the knowledge of existence of the desired object. Fake response from tag in undesired objects may fool the adversary. However, computation for fake responses is
an overhead. In this paper, we propose a search technique which has a negligible amount of computation for fake responses. Multiple tags in the same object increases the detection probability and also the probability of success in search process. Our aim is to search a particular object efficiently preserving the possible security requirements amid various resource limitations in low-cost RFID tag.
Handling Authentication and Detection Probability in Multi-tag RFID Environment, by Subhasish Dhal and Indranil Sengupta
In Radio Frequency Identification (RFID) technology, an adversary
may access classified information about an object tagged with RFID tag. Therefore, authentication is a necessary requirement. Use of multiple tags in an object increases the detection probability and simultaneously ensures availability of multiple resources in the form of memory and computability. Authentication process in multi-tag arrangement may increase the traffic between reader and object and/or decrease the detection probability. Therefore the challenge is to keep intact the detection probability without increasing the traffic. Existence of multiple number of tags helps to distribute the authentication responsibility for an object among multiple number of tags. In this paper, we assume that an object is attached with multiple number of active tags and in each session a randomly selected tag is responsible for authentication process. The detection probability is intact since an active tag within the range of reader can be an inter-mediator.
Revisiting the IACR Publication Strategy: An Invitation for Comments
One of the key roles of the the IACR is the review and dissemination of scientific publications. In the past three years, there has been an intensive discussion of publication options, in which several alternatives have been reviewed thoroughly.
At the end of 2012, the IACR has signed a new publication contract with Springer for a 4-year period (2013-2017); IACR continues to publish the proceedings of our flagship conferences and workshops in Springer's Lecture Notes in Computer Science series. This new contract makes substantial progress towards broader access to our publications and reduces the cost of publications. However, the IACR Board believes that the area of scientific publications will undergo further changes in the next years, in particular towards open access. In addition, the expansion of our field (more than 1200 submissions and more than 250 publications per year) has resulted in a steadily increasing reviewing load. Some other scientific communities have updated their publication models with a shift towards journal publications.
The IACR Board understands that any change to our publication model has major implications on our members and on the cryptographic community at large. We also have learned that changing this model would be complex and time consuming: in order to be ready for a new publication model in 2018, a new strategy would need to be in place by mid 2015.
In view of this, the IACR Board has decided to start an open discussion on the future of IACR publications. In order to focus this discussion, Nigel Smart has drafted a radical proposal, that would involve moving towards a journal publication model. This proposal has been outlined at the rump session of Eurocrypt'13 and has been further refined based on comments received. The reason for working with a detailed document is that this seems the best way to make sure that all issues are identified and detailed solutions are proposed and compared.
It should be fully understood that this document is a strawman proposal: it does not reflect the view of the IACR Board; the document has also not been discussed with the steering committees of the workshops. Its only intention is to start an open discussion. In particular, the Board welcomes detailed comments and alternative proposals for the future of IACR publications.
We are looking forward to hearing from the community.
IACR-International Association for Cryptologic Research