Deploying OSK on Low-Resource Mobile Devices

  • Gildas Avoine
  • Muhammed Ali Bingöl
  • Xavier Carpent
  • Süleyman Kardaş
Conference paper

DOI: 10.1007/978-3-642-41332-2_1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8262)
Cite this paper as:
Avoine G., Bingöl M.A., Carpent X., Kardaş S. (2013) Deploying OSK on Low-Resource Mobile Devices. In: Hutter M., Schmidt JM. (eds) Radio Frequency Identification. RFIDSec 2013. Lecture Notes in Computer Science, vol 8262. Springer, Berlin, Heidelberg

Abstract

It is a popular challenge to design authentication protocols that are both privacy-friendly and scalable. A large body of literature in RFID is dedicated to that goal, and many inventive mechanisms have been suggested to achieve it. However, to the best of our knowledge, none of these protocols have been tested so far in practical scenarios. In this paper, we present an implementation of the OSK protocol, a scalable and privacy-friendly authentication protocol, using a variant by Avoine and Oechslin that accommodates it to time-memory trade-offs. We show that the OSK protocol is suited to certain real-life scenarios, in particular when the authentication is performed by low-resource mobile devices. The implementation, done on an NFC-compliant cellphone and a ZC7.5 contactless tag, demonstrates the practicability and efficiency of the OSK protocol and illustrates that privacy-by-design is achievable in constrained environments.

Keywords

RFID authentication Implementation Time-memory trade offs Privacy 

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Gildas Avoine
    • 1
  • Muhammed Ali Bingöl
    • 2
    • 3
  • Xavier Carpent
    • 1
  • Süleyman Kardaş
    • 2
    • 3
  1. 1.ICTEAM InstituteUniversité Catholique de LouvainLouvain la NeuveBelgium
  2. 2.TÜBİTAK BİLGEM UEKAEGebzeTurkey
  3. 3.Faculty of Engineering and Natural SciencesSabancı UniversityİstanbulTurkey

Personalised recommendations