DocumentCode :
3316062
Title :
Untraceable RFID authentication protocols: Revision of EC-RAC
Author :
Lee, Yong Ki ; Batina, Lejla ; Verbauwhede, Ingrid
Author_Institution :
Dept. of Electr. Eng., Univ. of California, Los Angeles, CA
fYear :
2009
fDate :
27-28 April 2009
Firstpage :
178
Lastpage :
185
Abstract :
Radio Frequency IDentiflcation (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy is often overlooked in many applications, but due to pervasiveness of RFIDs the issue has to be taken into account. However, additional security always comes at price and the scarceness of resources on a tag makes conventional privacy-preserving protocols infeasible. In this paper we propose several authentication protocols that are all made of the same building blocks. More precisely, we first revise the EC-RAC (Elliptic Curve Based Randomized Access Control) protocol and we expand it into several authentication protocols. All the proposed protocols satisfy the basic requirements, which are the system scalability, un-traceability and security against cloning attacks and replay attacks, but each protocol has different security properties. The security proofs are implied by means of cryptographic reductions, i.e. they are based on the security of the Schnorr protocol and the hardness of the decisional Diffie-Hellman problem.
Keywords :
access protocols; cryptographic protocols; public key cryptography; radiofrequency identification; Schnorr protocol; cloning attacks; cryptographic reductions; decisional Diffie-Hellman problem; elliptic curve based randomized access control protocol; privacy risk; privacy-preserving protocols; radio frequency identification systems; replay attacks; untraceable RFID authentication protocols; Access control; Access protocols; Authentication; Cryptographic protocols; Inventory management; Privacy; Radio frequency; Radiofrequency identification; Security; Supply chains; Authentication Protocol; Elliptic Curve Cryptography; Mutual Authentication; RFID System; Tracking Attack; Un-traceability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
RFID, 2009 IEEE International Conference on
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4244-3337-7
Electronic_ISBN :
978-1-4244-3338-4
Type :
conf
DOI :
10.1109/RFID.2009.4911179
Filename :
4911179
Link To Document :
بازگشت