Skip to Main content Skip to Navigation
Conference papers

Practical Schemes for Privacy and Security Enhanced RFID

Abstract : Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.
Document type :
Conference papers
Complete list of metadata

Cited literature [26 references]  Display  Hide  Download

https://hal.inria.fr/hal-01059139
Contributor : Hal Ifip <>
Submitted on : Friday, August 29, 2014 - 1:59:16 PM
Last modification on : Thursday, January 4, 2018 - 6:34:02 PM
Long-term archiving on: : Sunday, November 30, 2014 - 10:41:30 AM

File

60330140.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Jaap-Henk Hoepman, Rieks Joosten. Practical Schemes for Privacy and Security Enhanced RFID. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.138-153, ⟨10.1007/978-3-642-12368-9_10⟩. ⟨hal-01059139⟩

Share

Metrics

Record views

150

Files downloads

254