DocumentCode :
3341515
Title :
Untraceability in the applied pi-calculus
Author :
Arapinis, M. ; Chothia, T. ; Ritter, E. ; Ryan, M.
Author_Institution :
Sch. of Comput. Sci., Univ. of Birmingham, Birmingham, UK
fYear :
2009
fDate :
9-12 Nov. 2009
Firstpage :
1
Lastpage :
6
Abstract :
The use of RFID tags in personal items, such as passports, may make it possible to track a person´s movements. Even RFID protocols that encrypt their identity may leak enough information to let an attacker trace a tag. In this paper we define strong and weak forms of untraceablility, and illustrate these definitions with a simple example. We formally define these concepts in the applied pi-calculus which in some cases makes it possible to automatically check if an RFID tag running a particular protocol is untraceable.
Keywords :
cryptography; pi calculus; radiofrequency identification; telecommunication computing; RFID tag; encryption; pi-calculus; radiofrequency identification; Computer science; Control systems; Cryptography; Data security; Databases; Identity-based encryption; Protocols; RFID tags; Radiofrequency identification; Tracking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for
Conference_Location :
London
Print_ISBN :
978-1-4244-5647-5
Type :
conf
DOI :
10.1109/ICITST.2009.5402514
Filename :
5402514
Link To Document :
بازگشت