Practical Schemes for Privacy and Security Enhanced RFID - Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices Access content directly
Conference Papers Year : 2010

Practical Schemes for Privacy and Security Enhanced RFID

Abstract

Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.
Fichier principal
Vignette du fichier
60330140.pdf (193.68 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01059139 , version 1 (29-08-2014)

Licence

Attribution

Identifiers

Cite

Jaap-Henk Hoepman, Rieks Joosten. Practical Schemes for Privacy and Security Enhanced RFID. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.138-153, ⟨10.1007/978-3-642-12368-9_10⟩. ⟨hal-01059139⟩
59 View
79 Download

Altmetric

Share

Gmail Facebook X LinkedIn More