A lightweight RFID protocol to protect against traceability and cloning attacks

被引:124
作者
Dimitriou, T [1 ]
机构
[1] Athens Informat Technol, Athens 19002, Greece
来源
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings | 2005年
关键词
D O I
10.1109/SECURECOMM.2005.4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or "smart" applications for users. However this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this work we present an RFID authentication protocol that enforces user privacy and protects against tag cloning. We designed our protocol with both tag-to-reader and reader-to-tag authentication in mind; unless both types of authentication are applied, any protocol can be shown to be prone to either cloning or privacy attacks. Our scheme is based on the use of a secret shared between tag and database that is refreshed to avoid tag tracing. However this is done in such a way so that efficiency of identification is not sacrificed. Additionally, our protocol is very simple and it can be implemented easily with the use of standard cryptographic hash functions. In analyzing our protocol, we identify several attacks that can be applied to RFID protocols and we demonstrate the security of our scheme. Furthermore, we show how forward privacy is guaranteed; messages seen today will still be valid in the future, even after the tag has been compromised.
引用
收藏
页码:59 / 66
页数:8
相关论文
共 15 条
[1]  
ABADI M, 1996, IEEE T SOFTWARE ENG, V22
[2]  
AVOINE G, 2005, 2 IEEE INT WORKSH PE
[3]  
Avoine G., 2005, FINANCIAL CRYPTOGRAP
[4]  
Bellare M., 1996, LECT NOTES COMPUTER, V1109
[5]  
FELDHOFER M, 2004, WORKSH CRYPT HARDW E
[6]  
HENRICI D, 2004, WORKSH PERV COMP COM
[7]  
JUELS A, 2004, SECURITY COMMUNICATI
[8]  
LENSTRA AK, 2000, P 3 INT WORKSH PRACT
[9]  
Menezes AJ., 1997, HDB APPL CRYPTOGRAPH
[10]  
MOLNAR D, 2004, C COMP COMM SEC