Proper RFID Privacy: Model and Protocols

Mobile Computing, IEEE Transactions  (2014)

引用 62|浏览47
暂无评分
摘要
We approach RFID privacy both from modelling and protocol point of view. Our privacy model avoids the drawbacks of several proposed RFID privacy models that either suffer from insufficient generality or put forward unrealistic assumptions regarding the adversary's ability to corrupt tags. Furthermore, our model can handle multiple readers and introduces two new privacy notions to capture the recently discovered insider attackers. We analyse multiple existing RFID protocols, demonstrating the easy applicability of our model, and propose a new wide-forward-insider private RFID authentication protocol. This protocol provides sufficient privacy guarantees for most practical applications and is the most efficient of its kind, it only requires two scalar-EC point multiplications.
更多
查看译文
关键词
protocols,radiofrequency identification,telecommunication security,RFID authentication protocol,RFID privacy models,insider attackers,privacy notions,proper RFID privacy,Computer security,RFID tags,authentication,cryptography,privacy
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要