Are RNGs Achilles’ Heel of RFID Security and Privacy Protocols?

被引:0
|
作者
Atakan Arslan
Süleyman Kardaş
Sultan Aldırmaz Çolak
Sarp Ertürk
机构
[1] Kocaeli University,Department of Electronics and Communication Engineering
[2] TÜBİTAK BİLGEM,Faculty of Engineering and Architecture
[3] Batman University,undefined
来源
Wireless Personal Communications | 2018年 / 100卷
关键词
RFID; Protocol; Privacy; Security; RNG;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy concerns have been growing with the increased utilisation of RFID technology in our daily lives. To mitigate these issues, numerous privacy-friendly authentication protocols have been published in the last decade. Random number generators (RNGs) are necessarily used in RFID tags to provide security and privacy. However, low-end RNGs can be the weakest point in a protocol scheme and using them might undesirably cause severe security and privacy problems. On the other hand, having a secure RNG with large entropy might be a trade-off between security and cost for low-cost RFID tags. Furthermore, RNGs used in low-cost RFID tags might not work properly in time. Therefore, we claim that the vulnerability of using an RNG deeply influences the security and privacy level of the RFID system. To the best of our knowledge, this concern has not been considered in the RFID literature. Motivated by this need, in this study, we first revisit Vaudenay’s privacy model which combines the early models and presents a new mature privacy model with different adversary classes. Then, we extend the model by introducing RANDOMEYE privacy, which allows analyzing the security of RNGs in RFID protocols. We further apply our extended model to two existing RFID schemes.
引用
收藏
页码:1355 / 1375
页数:20
相关论文
共 50 条
  • [1] Are RNGs Achilles' Heel of RFID Security and Privacy Protocols?
    Arslan, Atakan
    Kardas, Suleyman
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1355 - 1375
  • [2] RFID security and privacy: Concepts, protocols, and architectures
    Henrici, Dirk
    Lecture Notes in Electrical Engineering, 2008, 17 : 1 - 280
  • [3] Privacy: The Achilles heel of pervasive computing?
    Satyanarayanan, M
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 2 - 3
  • [4] Security: The Achilles heel of electronic commerce
    Backhouse, JP
    SOCIETY, 1998, 35 (04) : 28 - 31
  • [5] Security: The achilles heel of electronic commerce
    James P. Backhouse
    Society, 1998, 35 : 28 - 31
  • [6] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [7] RFID Security and Privacy
    1600, Morgan and Claypool Publishers (04):
  • [8] TRANSPORTATION - ACHILLES HEEL OF NATIONAL-SECURITY
    HARBESON, RW
    POLITICAL SCIENCE QUARTERLY, 1959, 74 (01) : 1 - 20
  • [9] APRIL: Finding the Achilles' Heel on Privacy for Vision Transformers
    Lu, Jiahao
    Zhang, Xi Sheryl
    Zhao, Tianli
    He, Xiangyu
    Cheng, Jian
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2022, : 10041 - 10050
  • [10] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,