DocumentCode
53390
Title
Proper RFID Privacy: Model and Protocols
Author
Hermans, Jeroen ; Peeters, Roel ; Preneel, Bart
Author_Institution
KU Leuven ESAT/COSIC & iMinds, Leuven, Belgium
Volume
13
Issue
12
fYear
2014
fDate
Dec. 1 2014
Firstpage
2888
Lastpage
2902
Abstract
We approach RFID privacy both from modelling and protocol point of view. Our privacy model avoids the drawbacks of several proposed RFID privacy models that either suffer from insufficient generality or put forward unrealistic assumptions regarding the adversary´s ability to corrupt tags. Furthermore, our model can handle multiple readers and introduces two new privacy notions to capture the recently discovered insider attackers. We analyse multiple existing RFID protocols, demonstrating the easy applicability of our model, and propose a new wide-forward-insider private RFID authentication protocol. This protocol provides sufficient privacy guarantees for most practical applications and is the most efficient of its kind, it only requires two scalar-EC point multiplications.
Keywords
protocols; radiofrequency identification; telecommunication security; RFID authentication protocol; RFID privacy models; insider attackers; privacy notions; proper RFID privacy; Authentication; Computational modeling; Privacy; Protocols; Radiofrequency identification; Computer security; RFID tags; authentication; cryptography; privacy;
fLanguage
English
Journal_Title
Mobile Computing, IEEE Transactions on
Publisher
ieee
ISSN
1536-1233
Type
jour
DOI
10.1109/TMC.2014.2314127
Filename
6779604
Link To Document