Javascript must be enabled to continue!
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
View through CrossRef
One of the concerns that comes with the use of RFID tags is that these respond to any query. This can be overcome by having mutual authentication between reader and tag. However, the ordering between the two authentication steps is crucial. In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the ordering between these authentication steps. We show that the reader needs to authenticate first to the yet unknown tag to 1) preserve the tag's privacy, 2) make it more resistant to side-channel analysis and 3) ensure that the end-user can observe the protocol's output. We propose a generic construction to transform existing private RFID authentication protocols into proper private RFID mutual authentication protocols. Finally, we design a very efficient wide-strong private RFID mutual authentication protocol that requires the tag to compute only three scalar-elliptic curve point multiplications. We also show how this new protocol can be implemented efficiently in hardware.
Title: IBIHOP: Proper Privacy Preserving Mutual RFID Authentication
Description:
One of the concerns that comes with the use of RFID tags is that these respond to any query.
This can be overcome by having mutual authentication between reader and tag.
However, the ordering between the two authentication steps is crucial.
In this paper, we formalise mutual RFID authentication: capturing the necessary coupling between tag authentication and reader authentication as well as the ordering between these authentication steps.
We show that the reader needs to authenticate first to the yet unknown tag to 1) preserve the tag's privacy, 2) make it more resistant to side-channel analysis and 3) ensure that the end-user can observe the protocol's output.
We propose a generic construction to transform existing private RFID authentication protocols into proper private RFID mutual authentication protocols.
Finally, we design a very efficient wide-strong private RFID mutual authentication protocol that requires the tag to compute only three scalar-elliptic curve point multiplications.
We also show how this new protocol can be implemented efficiently in hardware.
Related Results
RFID and Fingerprint Based Smart Bike Ignition System
RFID and Fingerprint Based Smart Bike Ignition System
The ascending rate of motorcycle larceny accentuates the desideratum for amended security solutions. Conventional key-predicated ignition systems are susceptible to unauthorized in...
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Unmanned aerial vehicles (UAVs) and radio frequency identification (RFID) technology are becoming very popular in the era of Industry 4.0, especially for retail, logistics, and war...
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Electronic Health (e-Health), such as mobile health (mHealth) and Health Information Systems (HIS), benefits healthcare consumers and professionals. However, it also poses potentia...
The Lifelog Monitoring System for Honeybees: RFID and Camera Recordings in an Observation Hive
The Lifelog Monitoring System for Honeybees: RFID and Camera Recordings in an Observation Hive
A typical honeybee colony contains more than 15,000 individuals, each with its own task related to supporting the hive and maintaining the colony. In previous studies on honeybees,...
RFID Mutual Authentication Protocols with Universally Composable Security
RFID Mutual Authentication Protocols with Universally Composable Security
Universally Composable (UC) framework is the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in th...
Automated Data Capture Technologies
Automated Data Capture Technologies
In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middlewar...
Enhancing RFID system configuration through semantic modelling
Enhancing RFID system configuration through semantic modelling
Abstract
Radio-Frequency Identification (RFID) system technology is a key element for the realization of the Industry 4.0 vision, as it is vital for tasks such as...
A study of RFID application for improving the installation process of precast concrete panels in a housing project
A study of RFID application for improving the installation process of precast concrete panels in a housing project
Two types of information, namely; related jobsite information along the process and feedback information have been found as essential elements for construction process improvement....

