Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventory...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 20 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Lim, Chae Hoon Kwon, Taekyoung |
description | RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership. |
doi_str_mv | 10.1007/11935308_1 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19183266</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19183266</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-db10583879738f8b61ac9b678d0eb8810a1e09d15d4e630145ce0b2ea0f88bf03</originalsourceid><addsrcrecordid>eNpVkE1LAzEYhOMXWGsv_oK9CF5W33eTzcexaKuFQqXWc0h2k3a1ZkuyRfz3rlQQT3OYh5lhCLlCuEUAcYeoaElBajwiIyUkLRkwxZSgx2SAHDGnlKmTfx7np2QAFIpcCUbPyUVKbwBQCFUMyOyli21YZybU2bK1-9Rly-nsIRvvu40LXVOZrmlDNgnGbpuee3bRu6rLFp_BxbRpdtkqmpC8i5fkzJttcqNfHZLX6WR1_5TPF4-z-_E8rwpVdnltEUpJpeg3Sy8tR1Mpy4WswVkpEQw6UDWWNXOcArKycmALZ8BLaT3QIbk-5O5MqszW9_VVk_QuNh8mfmlUKGnBec_dHLjUW2HtorZt-540gv65Uv9dSb8BdP9frQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</title><source>Springer Books</source><creator>Lim, Chae Hoon ; Kwon, Taekyoung</creator><contributor>Ning, Peng ; Qing, Sihan ; Li, Ninghui</contributor><creatorcontrib>Lim, Chae Hoon ; Kwon, Taekyoung ; Ning, Peng ; Qing, Sihan ; Li, Ninghui</creatorcontrib><description>RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540494966</identifier><identifier>ISBN: 3540494960</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540494973</identifier><identifier>EISBN: 3540494979</identifier><identifier>DOI: 10.1007/11935308_1</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Block Cipher ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Legitimate Reader ; Lightweight Block Cipher ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Ownership Transfer ; Software</subject><ispartof>Information and Communications Security, 2006, p.1-20</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-db10583879738f8b61ac9b678d0eb8810a1e09d15d4e630145ce0b2ea0f88bf03</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11935308_1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11935308_1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19183266$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Ning, Peng</contributor><contributor>Qing, Sihan</contributor><contributor>Li, Ninghui</contributor><creatorcontrib>Lim, Chae Hoon</creatorcontrib><creatorcontrib>Kwon, Taekyoung</creatorcontrib><title>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</title><title>Information and Communications Security</title><description>RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.</description><subject>Applied sciences</subject><subject>Block Cipher</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Legitimate Reader</subject><subject>Lightweight Block Cipher</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Ownership Transfer</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540494966</isbn><isbn>3540494960</isbn><isbn>9783540494973</isbn><isbn>3540494979</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkE1LAzEYhOMXWGsv_oK9CF5W33eTzcexaKuFQqXWc0h2k3a1ZkuyRfz3rlQQT3OYh5lhCLlCuEUAcYeoaElBajwiIyUkLRkwxZSgx2SAHDGnlKmTfx7np2QAFIpcCUbPyUVKbwBQCFUMyOyli21YZybU2bK1-9Rly-nsIRvvu40LXVOZrmlDNgnGbpuee3bRu6rLFp_BxbRpdtkqmpC8i5fkzJttcqNfHZLX6WR1_5TPF4-z-_E8rwpVdnltEUpJpeg3Sy8tR1Mpy4WswVkpEQw6UDWWNXOcArKycmALZ8BLaT3QIbk-5O5MqszW9_VVk_QuNh8mfmlUKGnBec_dHLjUW2HtorZt-540gv65Uv9dSb8BdP9frQ</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Lim, Chae Hoon</creator><creator>Kwon, Taekyoung</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</title><author>Lim, Chae Hoon ; Kwon, Taekyoung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-db10583879738f8b61ac9b678d0eb8810a1e09d15d4e630145ce0b2ea0f88bf03</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Block Cipher</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Legitimate Reader</topic><topic>Lightweight Block Cipher</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Ownership Transfer</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lim, Chae Hoon</creatorcontrib><creatorcontrib>Kwon, Taekyoung</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lim, Chae Hoon</au><au>Kwon, Taekyoung</au><au>Ning, Peng</au><au>Qing, Sihan</au><au>Li, Ninghui</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</atitle><btitle>Information and Communications Security</btitle><date>2006</date><risdate>2006</risdate><spage>1</spage><epage>20</epage><pages>1-20</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540494966</isbn><isbn>3540494960</isbn><eisbn>9783540494973</eisbn><eisbn>3540494979</eisbn><abstract>RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11935308_1</doi><tpages>20</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Information and Communications Security, 2006, p.1-20 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19183266 |
source | Springer Books |
subjects | Applied sciences Block Cipher Computer science control theory systems Computer systems and distributed systems. User interface Exact sciences and technology Legitimate Reader Lightweight Block Cipher Memory and file management (including protection and security) Memory organisation. Data processing Ownership Transfer Software |
title | Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T16%3A57%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Strong%20and%20Robust%20RFID%20Authentication%20Enabling%20Perfect%20Ownership%20Transfer&rft.btitle=Information%20and%20Communications%20Security&rft.au=Lim,%20Chae%20Hoon&rft.date=2006&rft.spage=1&rft.epage=20&rft.pages=1-20&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540494966&rft.isbn_list=3540494960&rft_id=info:doi/10.1007/11935308_1&rft_dat=%3Cpascalfrancis_sprin%3E19183266%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540494973&rft.eisbn_list=3540494979&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |