Computer viruses: theory and experiments
Computers and Security
Using encryption for authentication in large networks of computers
Communications of the ACM
The Mathematics of Infectious Diseases
SIAM Review
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Integrated routing and storage for messaging applications in mobile ad hoc networks
Mobile Networks and Applications
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Defining Strong Privacy for RFID
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Practical Routing in Delay-Tolerant Networks
IEEE Transactions on Mobile Computing
A "Paradoxical" Solution To The Signature Problem
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
When Compromised Readers Meet RFID
Information Security Applications
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Time measurement threatens privacy-friendly RFID authentication protocols
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Delay tolerant mobile networks (DTMNs): controlled flooding in sparse mobile networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Modeling privacy for off-line RFID systems
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
IEEE Communications Surveys & Tutorials
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
PUF-enhanced offline RFID security and privacy
Journal of Network and Computer Applications
Hi-index | 0.00 |
Authentication protocols are usually designed to face an adversary who is able to tamper with the channel, possibly with the prover, but rarely with the verifier. When considering large-scale RFID applications, e.g., mass transportation or ticketing, the last threat is no longer a fiction. A typical case is the loss or theft of a handheld reader. If the protocol is expected to be privacy-friendly, and run by offline readers, there is no solution currently to restore the privacy once the readers are compromised except renewing all the tags, which is definitely impractical. We introduce a privacy-friendly authentication protocol that is able to maintain the security level in case of compromised readers, but also gradually restores the privacy thanks to the mobility of the customers in the system. We provide a thorough security analysis and a precise performance evaluation of our proposal. The efficiency of our solution is also demonstrated on a real-life case: we analyze the logs of 55 offline readers used during a 3-day sport event in 2010 that involved more than 100,000 tags.