Title :
Proper RFID Privacy: Model and Protocols
Author :
Hermans, Jeroen ; Peeters, Roel ; Preneel, Bart
Author_Institution :
KU Leuven ESAT/COSIC & iMinds, Leuven, Belgium
Abstract :
We approach RFID privacy both from modelling and protocol point of view. Our privacy model avoids the drawbacks of several proposed RFID privacy models that either suffer from insufficient generality or put forward unrealistic assumptions regarding the adversary´s ability to corrupt tags. Furthermore, our model can handle multiple readers and introduces two new privacy notions to capture the recently discovered insider attackers. We analyse multiple existing RFID protocols, demonstrating the easy applicability of our model, and propose a new wide-forward-insider private RFID authentication protocol. This protocol provides sufficient privacy guarantees for most practical applications and is the most efficient of its kind, it only requires two scalar-EC point multiplications.
Keywords :
protocols; radiofrequency identification; telecommunication security; RFID authentication protocol; RFID privacy models; insider attackers; privacy notions; proper RFID privacy; Authentication; Computational modeling; Privacy; Protocols; Radiofrequency identification; Computer security; RFID tags; authentication; cryptography; privacy;
Journal_Title :
Mobile Computing, IEEE Transactions on
DOI :
10.1109/TMC.2014.2314127