Hierarchical ECC-Based RFID authentication protocol

  • Authors:
  • Lejla Batina;Stefaan Seys;Dave Singelée;Ingrid Verbauwhede

  • Affiliations:
  • K.U.Leuven ESAT/SCD-COSIC and IBBT, Leuven-Heverlee, Belgium;K.U.Leuven ESAT/SCD-COSIC and IBBT, Leuven-Heverlee, Belgium;K.U.Leuven ESAT/SCD-COSIC and IBBT, Leuven-Heverlee, Belgium;K.U.Leuven ESAT/SCD-COSIC and IBBT, Leuven-Heverlee, Belgium

  • Venue:
  • RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RFID readers. To tackle this problem, we introduce the concept of RFID groups and propose a hierarchical RFID authentication protocol. By using this protocol, an RFID tag can tune its identification process to the type of reader it is communicating with. Only a subset of readers can learn the identity of a particular tag, while others can only acquire information on the group to which the tag belongs. Our protocol offers impersonation resistance and is narrow-strong privacy-preserving. Furthermore, we extend the concept to multiple level of subgroups, and demonstrate the feasibility of our proposed protocols for RFID tags.