Practical Schemes for Privacy and Security Enhanced RFID

被引:0
|
作者
Hoepman, Jaap-Henk
Joosten, Rieks
机构
关键词
ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.
引用
收藏
页码:138 / 153
页数:16
相关论文
共 50 条
  • [1] Proxy framework for enhanced RFID security and privacy
    Dimitriou, Tassos
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 843 - 847
  • [2] PUF-enhanced offline RFID security and privacy
    Kardas, Suleyman
    Celik, Serkan
    Yildiz, Muhammet
    Levi, Albert
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 2059 - 2067
  • [3] Privacy Models for RFID Schemes
    Vaudenay, Serge
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 65 - 65
  • [4] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [5] The Security and Privacy Protection in RFID
    Fu, Chunchang
    He, Weilin
    [J]. FRONTIERS OF ADVANCED MATERIALS AND ENGINEERING TECHNOLOGY, PTS 1-3, 2012, 430-432 : 1755 - 1758
  • [6] A Study on Security and Privacy in RFID
    Zarmehi, Sadegh
    Elyasi, Iman
    Kowsar, Zohreh
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 22 - 25
  • [7] Privacy and security problems in RFID
    Razaq, A.
    Luk, W. T.
    Cheng, L. M.
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 401 - +
  • [8] Enhanced security and privacy mechanism of RFID service for pervasive mobile device
    Lee, B
    Kim, H
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 469 - 475
  • [9] RFID TECHNOLOGY, PRIVACY AND SECURITY
    Stankovski, Stevan
    Ostojic, Gordana
    Lazarevic, Milovan
    Popovic, Bozidar
    Mijic, Danijel
    [J]. FACTA UNIVERSITATIS-SERIES MECHANICAL ENGINEERING, 2010, 8 (01) : 57 - 62
  • [10] Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    [J]. IETE TECHNICAL REVIEW, 2015, 32 (03) : 183 - 187