Low-cost untraceable authentication protocols for RFID

  • Authors:
  • Yong Ki Lee;Lejla Batina;Dave Singelée;Ingrid Verbauwhede

  • Affiliations:
  • University of California, Los Angeles, CA, USA;Radboud University Nijmegen, Nijmegen, Netherlands;Katholieke Universiteit Leuven, Heverlee, Belgium;Katholieke Universiteit Leuven / UCLA, Heverlee, Belgium

  • Venue:
  • Proceedings of the third ACM conference on Wireless network security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The emergence of pervasive computing devices has raised several privacy issues. In this paper, we address the risk of tracking attacks in RFID networks. Our contribution is threefold: (1) We repair three revised EC-RAC protocols of Lee, Batina and Verbauwhede and show that two of the improved authentication protocols are wide-strong privacy-preserving and one wide-weak privacy-preserving; (2) We present the search protocol, a novel scheme which allows for privately querying a particular tag, and proof its security properties; and (3) We design a hardware architecture to demonstrate the implementation feasibility of our proposed solutions for a passive RFID tag. Due to the specific design of our authentication protocols, they can be realized with an area significantly smaller than other RFID schemes proposed in the literature, while still achieving the required security and privacy properties.