Skip to Main content Skip to Navigation
Conference papers

Practical Schemes for Privacy and Security Enhanced RFID

Abstract : Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.
Document type :
Conference papers
Complete list of metadata

Cited literature [26 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, August 29, 2014 - 1:59:16 PM
Last modification on : Thursday, January 4, 2018 - 6:34:02 PM
Long-term archiving on: : Sunday, November 30, 2014 - 10:41:30 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Jaap-Henk Hoepman, Rieks Joosten. Practical Schemes for Privacy and Security Enhanced RFID. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.138-153, ⟨10.1007/978-3-642-12368-9_10⟩. ⟨hal-01059139⟩



Record views


Files downloads