Pre vs Post State Update: Trading Privacy for Availability in RFID
Designing lightweight RFID protocols that support strong privacy is a major challenge. For anonymity tags use pseudonyms that are refreshed with every interrogation (whether completed or not). For forward secrecy, the state of tags must be updated and it must be hard to reverse updates. Since the in...
Gespeichert in:
Veröffentlicht in: | IEEE wireless communications letters 2014-06, Vol.3 (3), p.317-320 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Designing lightweight RFID protocols that support strong privacy is a major challenge. For anonymity tags use pseudonyms that are refreshed with every interrogation (whether completed or not). For forward secrecy, the state of tags must be updated and it must be hard to reverse updates. Since the interrogating reader can be adversarial, the adversary may control state updates. It follows that it may not be possible for tags to maintain synchrony with authorized readers. In this letter we analyze a recently proposed RFID protocol and show that there is a fundamental trade-off between privacy and availability. We prove that for lightweight RFID applications strong privacy cannot be achieved in the presence of a Byzantine adversary. |
---|---|
ISSN: | 2162-2337 2162-2345 |
DOI: | 10.1109/WCL.2014.032814.140043 |