Corpus ID: 17814481

Adversarial Model for Radio Frequency Identification

@article{Avoine2005AdversarialMF,
  title={Adversarial Model for Radio Frequency Identification},
  author={Gildas Avoine},
  journal={IACR Cryptol. ePrint Arch.},
  year={2005},
  volume={2005},
  pages={49}
}
  • Gildas Avoine
  • Published 2005
  • Computer Science
  • IACR Cryptol. ePrint Arch.
Radio Frequency Identification (RFID) systems aim to identify objects in open environments with neither physical nor visual contact. [...] Key Method We show that our formalisation fits the problem being considered and allows a formal analysis of the protocols in terms of traceability. We use our model on several well-known RFID protocols and we show that most of them have weaknesses and are vulnerable to traceability.Expand
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability
  • Huafei Zhu, F. Bao
  • Computer Science
  • 2007 IEEE Wireless Communications and Networking Conference
  • 2007
TLDR
A security model that supports the analytical argument of properties, addressing both security and performance issues for RFID tags is introduced and formalized in this paper, and the implementation is completeness, soundness and non-traceability in the independent random oracle model. Expand
Secure Anonymous RFID Authentication Protocols
The growing use of Radio Frequency Identification (RFID) technology to enhance ubiquitous computing environments has only begun to be realized. It allows for the identification of objects and/orExpand
An efficient forward private RFID protocol
TLDR
This paper proposes a novel forward private authentication scheme built upon less computationally expensive cryptographic ingredients, namely pseudo-random generators and universal hash functions instead of one way hash functions and provides security proofs of the construction in the standard model instead of the random oracle model. Expand
PUF-enhanced offline RFID security and privacy
TLDR
This paper revisits Vaudenay's model, extends it by considering offline RFID system and introduces the notion of compromise reader attacks, and proposes an efficient RFID mutual authentication protocol based on the use of physically unclonable functions which provide cost-efficient means to the fingerprint chips based on their physical properties. Expand
Privacy-Preserving RFID Systems: Model and Constructions
TLDR
This work presents the first security model for RFID authentication/identification privacypreserving systems which is at the same time complete and easy to use and includes adversaries with no restrictions on their interactions with the system. Expand
Impossibility Results for RFID Privacy Notions
TLDR
The model proposed by Paise and Vaudenay is revisited and it is shown that the strongest privacy notion (narrow-strong privacy) cannot be achieved simultaneously with reader authentication even under the strong assumption that tag corruption does not disclose temporary tag states. Expand
Mutual authentication protocols for RFID special schemes
TLDR
This thesis studied RFID security and privacy in several schemes, such as in RFID-enabled supply chains, RFID cloud-based scheme, and multi-tag group reading schemes, and focused on how to improve and propose RFID mutual authentication protocols in such schemes that are practical and cost effective, and satisfy the security and Privacy requirements. Expand
ACTION: Breaking the Privacy Barrier for RFID Systems
TLDR
An Anti- Compromising authenticaTION protocol is proposed, ACTION, which employs a novel sparse tree architecture, such that the key of every tag is independent from one another. Expand
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection
TLDR
This paper modified the original MARP scheme for reducing the probability of preventing attacker's eavesdropping and for reduced the communication number of tags, and back-end servers can authenticate mobile agents more easily using public key cryptography in this scheme. Expand
Institutional Repository Privacy of recent RFID authentication protocols
Privacy is a major concern in RFID systems, especially with widespread deployment of wireless-enabled interconnected personal devices e.g. PDAs and mobile phones, credit cards, e-passports, evenExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 33 REFERENCES
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
TLDR
The privacy protection using universal re-encryption proposed by Golle, Jakobsson, Juels and Syverson is discussed and two proposed schemes for addressing the problem are offered. Expand
Privacy and security in library RFID: issues, practices, and architectures
TLDR
Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations. Expand
Cryptographic Approach to “Privacy-Friendly” Tags
TLDR
This paper discusses and clarifies the requirements and restrictions of RFID systems, and suggests the use of the previously proposed scheme, which protects user privacy using a low-cost hash chain mechanism. Expand
Minimalist Cryptography for Low-Cost RFID Tags
TLDR
It is shown that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices, and a new security model for authentication and privacy in RFID tags is proposed, which involves no computationally intensive cryptographic operations, and relatively little storage. Expand
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
  • Dirk Henrici, P. Müller
  • Computer Science
  • IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second
  • 2004
TLDR
This work introduces a simple scheme relying on one way hash-functions that greatly enhances location privacy by changing traceable identifiers on every read getting by with only a single, unreliable message exchange. Expand
Radio Frequency Identification and Privacy with Information Goods
Abstract This paper examines the privacy impacts of using RFID to tag information goods such as books, music, and video. Information goods have qualities which make surveillance uniquely invasive.Expand
Privacy Issues in RFID Banknote Protection Schemes
TLDR
It is proved that despite what the authors claimed, an attacker can track the banknotes by using the access-key as a marker, circumventing the randomized encryption scheme that aims at thwarting such attacks. Expand
RFID Traceability: A Multilayer Problem
TLDR
It is demonstrated that privacy issues cannot be solved without looking at each layer separately, and it is shown that current solutions fail to address the multilayer aspect of privacy and as a result fail to protect it. Expand
Strong Authentication for RFID Systems Using the AES Algorithm
TLDR
A novel approach of an AES hardware implementation which encrypts a 128-bit block of data within 1000 clock cycles and has a power consumption below 9 μA on a 0.35 μm CMOS process is introduced. Expand
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
TLDR
A simple and practical system that provides a high degree of privacy assurance that depends on a careful separation of the privileges offered by optical vs. radio-frequency contact with banknotes and full exploitation of the limited access-control capabilities of RFID tags. Expand
...
1
2
3
4
...