Abstract
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication abilities of a typical RFID tag. This paper describes a step-by-step construction of a family of simple protocols for inexpensive untraceable identification and authentication of RFID tags. This work is aimed primarily at RFID tags that are capable of performing a small number of inexpensive conventional (as opposed to public key) cryptographic operations. It also represents the first result geared for so-called batch mode of RFID scanning whereby the identification (and/or authentication) of tags is delayed. Proposed protocols involve minimal interaction between a tag and a reader and place very low computational burden on the tag. Notably, they also impose low computational load on back-end servers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tsudik, G.: Yet Another Trivial RFID Authentication Protocol, IEEE PerCom (Work-in-Progress Session) (March 2006)
Molnar, D., Soppera, A., Wagner, D.: A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In: Workshop in Selected Areas in Cryptography (August 2005)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol, PerSec Workshop (March 2005)
Burmester, M., de Medeiros, B., Van Le, T.: Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols, IEEE/Createnet Securecomm (September 2006)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: UBICOMP Workshop on Privacy: Current Status and Future Directions (2004)
Herzberg, A., Krawczyk, H., Tsudik, G.: On Traveling Incognito. In: IEEE Workshop on Mobile Systems and Applications (December 1994)
Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: On Traveling Incognito. Computer Networks 31(8), 871–884 (1999)
Hellman, M.: A cryptanalytic time-memory tradeoff. IEEE Transactions on Information Theory 26, 401–406 (1980)
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, Springer, Heidelberg (2006)
Juels, A., Weis, S.: Defining Strong Privacy for RFID, IACR eprint (April 2006)
Avoine, G.: Security and Privacy in RFID Systems: Bibliography (February 2007), http://lasecwww.epfl.ch/~gavoine/rfid/
Steiner, J., Neuman, B., Schiller, J.: Kerberos: An Authentication Service for Open Network Systems. In: USENIX Winter 1988 Technical Conference, pp. 191–202 (1988)
Redl, S., Weber, M., Oliphant, M.: GSM and Personal Communications Handbook, Artech House (May 1998), ISBN 13: 978-0890069578
Krawczyk, H.: Simple forward-secure signatures from any signature scheme. In: ACM Conference on Computer and Communications Security, pp. 108–115. ACM Press, New York (2000)
Anderson, R.: Two remarks on public-key cryptology, Invited Talk. In: ACM Conference on Computer and Communications Security, ACM Press, New York (1997)
Tan, C., Sheng, B., Li, Q.: Serverless Search and Authentication Protocols for RFID. In: IEEE PerCom 2007, IEEE Computer Society Press, Los Alamitos (2007)
Juels, A., Syverson, P., Bailey, D.: High-Power Proxies for Enhancing RFID Privacy and Utility. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, Springer, Heidelberg (2006)
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Security in Pervasive Computing Conference (SPC 2003) (March 2003)
Juels, A.: Yoking-Proofs for RFID Tags. In: Workshop on Pervasive Computing and Communication Security (PerSec) (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tsudik, G. (2007). A Family of Dunces: Trivial RFID Identification and Authentication Protocols. In: Borisov, N., Golle, P. (eds) Privacy Enhancing Technologies. PET 2007. Lecture Notes in Computer Science, vol 4776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75551-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-75551-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75550-0
Online ISBN: 978-3-540-75551-7
eBook Packages: Computer ScienceComputer Science (R0)