A Privacy-friendly RFID Protocol using Reusable Anonymous Tickets

被引:7
作者
Asadpour, Mahdi [1 ]
Dashti, Mohammad Torabi [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
关键词
Privacy; Anonymity; Untraceability; RFID; Formal Proof; Automated Verification; SECURITY; SYSTEMS;
D O I
10.1109/TrustCom.2011.29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A majority of the existing privacy-friendly RFID protocols use the output of a cryptographic hash function in place of real identity of an RFID tag to ensure anonymity and untraceability. In order to provide unique identification for the tags, these protocols assume that the hash functions are collision resistant. We show that, under this assumption on the hash functions, a substantial number of the existing protocols suffer from a traceability problem that causes differentiating a tag from another. We propose a scalable privacy-friendly RFID protocol and describe its design and implementation issues. Our protocol substitutes the hash functions used for identification with anonymous tickets, thus avoiding the aforementioned traceability problem. The anonymous tickets are reusable. They nevertheless identify the tags uniquely, at any given point in time. The query and search algorithm of our proposed protocol is of O(1) time complexity, and it imposes small storage overhead on the backend database. We show that the protocol is scalable, and compare its storage and computational requirements to some existing protocols. We formally prove the security requirements of our protocol, and mechanically analyze some of its requirements using the model checker OFMC.
引用
收藏
页码:206 / 213
页数:8
相关论文
共 14 条
[1]  
Alomair B, 2010, I C DEPEND SYS NETWO, P1, DOI 10.1109/DSN.2010.5545008
[2]  
Asadpour M., 2011, TECHNICAL REPORT
[3]  
Avoine G., 2010, WORKSH RFID SEC
[4]  
Avoine G., 2005, TECHNICAL REPORT
[5]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[6]  
Camenisch J, 2010, LECT NOTES COMPUT SC, V6371, P198, DOI 10.1007/978-3-642-15898-8_13
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]   Providing Security and Privacy in RFID Systems Using Triggered Hash Chains [J].
Henrici, Dirk ;
Mueller, Paul .
2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, :50-59
[9]  
Henrici Dirk, 2008, LECT NOTES ELECT ENG
[10]  
Mödersheim S, 2009, LECT NOTES COMPUT SC, V5789, P337, DOI 10.1007/978-3-642-04444-1_21