When Compromised Readers Meet RFID

  • Authors:
  • Gildas Avoine;Cédric Lauradoux;Tania Martin

  • Affiliations:
  • Information Security Group, Université catholique de Louvain, Louvain-La-Neuve, Belgium B-1348;Information Security Group, Université catholique de Louvain, Louvain-La-Neuve, Belgium B-1348;Information Security Group, Université catholique de Louvain, Louvain-La-Neuve, Belgium B-1348

  • Venue:
  • Information Security Applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end system. The readers must so be able to perform their tasks even in offline mode, what commonly requires the management by the readers of sensitive data.We stress in this paper the problem of compromised readers and its impact in practice. We provide a thorough review of the existing authentication protocols faced to this constraint, and extend our analysis with the privacy property. We show that none of the reviewed protocols fits the required properties in case of compromised readers. We then design a sporadically-online solution that meets our expectations in terms of both security and privacy.