1.School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013, China; 2.School of Computer Science and Technology, Anhui University, Hefei, Anhui 230601, China; 3.Automotive Engineering Research Institute, Jiangsu University, Zhenjiang, Jiangsu 212013, China
Abstract:To achieve privacy protection in RFID system, the existing attacks were discussed to define privacy protection demand based on comprehensive survey. The existing variety of RFID privacy mechanisms were reviewed, especially for the protocols based on cryptographic technique. According to time complexity in tag identification, the protocols were categorized into 3 classes of constanttime, logarithmictime and lineartime protocols. The RFID privacy models between symbolic operation and computational complexity were compared emphatically. The computational complexity has two kinds of provable security basis of indistinguishability unpredictability. The results show that the balance between privacy and cost should be considered during designing protocal.A unified and widely accepted privacy model is urgent for evaluating privacy protection of RFID system.