Advertisement

New Directions in RFID Security

  • Erik-Oliver Blass
  • Refik Molva
Conference paper
  • 412 Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 309)

Abstract

Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, and 2. RFID-based Payment. In multi-tag security, multiple tags try to jointly compute an information while using the reader either as the focal point of all communication or as a relay for tag-to-tag communication. In this scenario, the security of the computation has to be guaranteed while also privacy of individual tags must be protected. In a payment scenario, tags are used as electronic wallets similar to the notions of traditional electronic cash. Payment must be secured against malicious spending, and the privacy of tags and their payments must be protected.

Keywords

Blind Signature Homomorphic Encryption Electronic Cash Annual International Cryptology Secure Data Aggregation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Ateniese, G., Blanton, M., Kirsch, J.: Secret handshakes with dynamic and fuzzy matching. In: Network and Distributed System Security Symposium, pp. 159–177 (2007)Google Scholar
  2. 2.
    Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in rfid systems. In: Proceedings of Selected Areas in Cryptography, Kingston, Canada, pp. 291–306 (2005) ISBN 978-3-540-33108-7Google Scholar
  3. 3.
    Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.C.: Secret handshakes from pairing-based key agreements. In: IEEE Symposium on Security and Privacy, pp. 180–196 (2003)Google Scholar
  4. 4.
    Brands, S.: Untraceable off-line cash in wallets with observers. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, USA, pp. 302–318 (1993) ISBN 3-540-57766-1Google Scholar
  5. 5.
    Castellucia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: 2nd Annual International Conference on Mobile and Ubiquitous Systems, Mobiquitous (2005)Google Scholar
  6. 6.
    Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, USA, pp. 199–203 (1982)Google Scholar
  7. 7.
    Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, USA, pp. 319–327 (1988) ISBN 3-540-97196-3Google Scholar
  8. 8.
    Dimitrou, T.: Rfiddot: Rfid delegation and ownership transfer made simple. In: Proceedings of International Conference on Security and privacy in Communication Networks, Istanbul, Turkey (2008) ISBN 978-1-60558-241-2Google Scholar
  9. 9.
    Girao, J., Westhoff, D., Schneider, M.: Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: IEEE ICC 2005 (2005)Google Scholar
  10. 10.
    Juels, A., Weis, S.: Defining strong privacy for rfid. In: PerCom Workshops, White Plains, USA, pp. 342–347 (2007) ISBN 978-0-7695-2788-8Google Scholar
  11. 11.
    Önen, M., Molva, R.: Secure data aggregation with multiple encryption. In: Langendoen, K.G., Voigt, T. (eds.) EWSN 2007. LNCS, vol. 4373, pp. 117–132. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  12. 12.
    Pietro, R.D., Molva, R.: Information confinement, privacy, and security in rfid systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 187–202. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Sorniotti, A., Molva, R.: A provably secure secret handshake with dynamic controlled matching. In: IFIP SEC 2009, 24th International Information Security Conference, Pafos, Cyprus, May 18-20 (2009)Google Scholar
  14. 14.
    Transport for London: Oyster online (2009), https://oyster.tfl.gov.uk/oyster/entry.do
  15. 15.
    Tsudik, G.: Ya-trap: yet another trivial rfid authentication protocol. In: Proceedings of International Conference on Pervasive Computing and Communications Workshops, Pisa, Italy (2006) ISBN 0-7695-2520-2Google Scholar
  16. 16.
    van Tilborg, H.C.A. (ed.): Encyclopedia of Cryptography and Security. Springer, Heidelberg (2005)zbMATHGoogle Scholar
  17. 17.
    Vaudenay, S.: On privacy models for rfid. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  18. 18.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, Boppard, Germany, pp. 201–212 (2003) ISBN 3-540-20887-9Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Erik-Oliver Blass
    • 1
  • Refik Molva
    • 1
  1. 1.EURECOMSophia AntipolisFrance

Personalised recommendations