Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

IBIHOP: Proper Privacy Preserving Mutual RFID Authentication

View through CrossRef
One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the ordering between these authentication steps. We show that the reader needs to authenticate first to the yet unknown tag to 1) preserve the tag's privacy, 2) make it more resistant to side-channel analysis and 3) ensure that the end-user can observe the protocol's output. We propose a generic construction to transform existing private RFID authentication protocols into proper private RFID mutual authentication protocols. Finally, we design a very efficient wide-strong private RFID mutual authentication protocol that requires the tag to compute only three scalar-elliptic curve point multiplications. We also show how this new protocol can be implemented efficiently in hardware.
Title: IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
Description:
One of the concerns that comes with the use of RFID tags is that these respond to any query.
This can be overcome by having mutual authentication between reader and tag.
However, the ordering between the two authentication steps is crucial.
In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the ordering between these authentication steps.
We show that the reader needs to authenticate first to the yet unknown tag to 1) preserve the tag's privacy, 2) make it more resistant to side-channel analysis and 3) ensure that the end-user can observe the protocol's output.
We propose a generic construction to transform existing private RFID authentication protocols into proper private RFID mutual authentication protocols.
Finally, we design a very efficient wide-strong private RFID mutual authentication protocol that requires the tag to compute only three scalar-elliptic curve point multiplications.
We also show how this new protocol can be implemented efficiently in hardware.

Related Results

Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Unmanned aerial vehicles (UAVs) and radio frequency identification (RFID) technology are becoming very popular in the era of Industry 4.0, especially for retail, logistics, and war...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
RFID Mutual Authentication Protocols with Universally Composable Security
RFID Mutual Authentication Protocols with Universally Composable Security
Universally Composable (UC) framework is the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in th...
Enhancing RFID system configuration through semantic modelling
Enhancing RFID system configuration through semantic modelling
Abstract Radio-Frequency Identification (RFID) system technology is a key element for the realization of the Industry 4.0 vision, as it is vital for tasks such as entity trackin...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Implementation of RFID for Verification of PC Usage in the UMSIDA’s Electrical Engineering Laboratory Based on the Internet of Things
Implementation of RFID for Verification of PC Usage in the UMSIDA’s Electrical Engineering Laboratory Based on the Internet of Things
Every day visitors to the UMSIDA electrical engineering laboratory have different goals. The main function of the laboratory is as a practicum for electrical engineering students a...

Back to Top