Composition and integrity preservation of secure reactive systems
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.