Proper RFID Privacy: Model and Protocols

被引:28
作者
Hermans, Jens [1 ]
Peeters, Roel [1 ]
Preneel, Bart [1 ]
机构
[1] KU Leuven ESAT COSIC & iMinds, Leuven, Belgium
关键词
Computer security; authentication; privacy; cryptography; RFID tags; SECURITY;
D O I
10.1109/TMC.2014.2314127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We approach RFID privacy both from modelling and protocol point of view. Our privacy model avoids the drawbacks of several proposed RFID privacy models that either suffer from insufficient generality or put forward unrealistic assumptions regarding the adversary's ability to corrupt tags. Furthermore, our model can handle multiple readers and introduces two new privacy notions to capture the recently discovered insider attackers. We analyse multiple existing RFID protocols, demonstrating the easy applicability of our model, and propose a new wide-forward-insider private RFID authentication protocol. This protocol provides sufficient privacy guarantees for most practical applications and is the most efficient of its kind, it only requires two scalar-EC point multiplications.
引用
收藏
页码:2888 / 2902
页数:15
相关论文
共 38 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]  
[Anonymous], P ASIACCS 2009
[3]  
[Anonymous], P RAD FREQ ID SYST S
[4]  
[Anonymous], 2006, SECURECOMM
[5]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[6]  
[Anonymous], P EUR C PUBL KEY INF
[7]  
[Anonymous], P 11 INT C CRYPT NET
[8]  
[Anonymous], 2008, P 2008 ACM S INFORM
[9]  
[Anonymous], 1982, 23 ANN S FDN COMP SC
[10]  
[Anonymous], 2010, PRIVACY PRESERVING R