DocumentCode :
53390
Title :
Proper RFID Privacy: Model and Protocols
Author :
Hermans, Jeroen ; Peeters, Roel ; Preneel, Bart
Author_Institution :
KU Leuven ESAT/COSIC & iMinds, Leuven, Belgium
Volume :
13
Issue :
12
fYear :
2014
fDate :
Dec. 1 2014
Firstpage :
2888
Lastpage :
2902
Abstract :
We approach RFID privacy both from modelling and protocol point of view. Our privacy model avoids the drawbacks of several proposed RFID privacy models that either suffer from insufficient generality or put forward unrealistic assumptions regarding the adversary´s ability to corrupt tags. Furthermore, our model can handle multiple readers and introduces two new privacy notions to capture the recently discovered insider attackers. We analyse multiple existing RFID protocols, demonstrating the easy applicability of our model, and propose a new wide-forward-insider private RFID authentication protocol. This protocol provides sufficient privacy guarantees for most practical applications and is the most efficient of its kind, it only requires two scalar-EC point multiplications.
Keywords :
protocols; radiofrequency identification; telecommunication security; RFID authentication protocol; RFID privacy models; insider attackers; privacy notions; proper RFID privacy; Authentication; Computational modeling; Privacy; Protocols; Radiofrequency identification; Computer security; RFID tags; authentication; cryptography; privacy;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2014.2314127
Filename :
6779604
Link To Document :
بازگشت