Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer

RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventory...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lim, Chae Hoon, Kwon, Taekyoung
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 20
container_issue
container_start_page 1
container_title
container_volume
creator Lim, Chae Hoon
Kwon, Taekyoung
description RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.
doi_str_mv 10.1007/11935308_1
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19183266</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19183266</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-db10583879738f8b61ac9b678d0eb8810a1e09d15d4e630145ce0b2ea0f88bf03</originalsourceid><addsrcrecordid>eNpVkE1LAzEYhOMXWGsv_oK9CF5W33eTzcexaKuFQqXWc0h2k3a1ZkuyRfz3rlQQT3OYh5lhCLlCuEUAcYeoaElBajwiIyUkLRkwxZSgx2SAHDGnlKmTfx7np2QAFIpcCUbPyUVKbwBQCFUMyOyli21YZybU2bK1-9Rly-nsIRvvu40LXVOZrmlDNgnGbpuee3bRu6rLFp_BxbRpdtkqmpC8i5fkzJttcqNfHZLX6WR1_5TPF4-z-_E8rwpVdnltEUpJpeg3Sy8tR1Mpy4WswVkpEQw6UDWWNXOcArKycmALZ8BLaT3QIbk-5O5MqszW9_VVk_QuNh8mfmlUKGnBec_dHLjUW2HtorZt-540gv65Uv9dSb8BdP9frQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</title><source>Springer Books</source><creator>Lim, Chae Hoon ; Kwon, Taekyoung</creator><contributor>Ning, Peng ; Qing, Sihan ; Li, Ninghui</contributor><creatorcontrib>Lim, Chae Hoon ; Kwon, Taekyoung ; Ning, Peng ; Qing, Sihan ; Li, Ninghui</creatorcontrib><description>RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540494966</identifier><identifier>ISBN: 3540494960</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540494973</identifier><identifier>EISBN: 3540494979</identifier><identifier>DOI: 10.1007/11935308_1</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Block Cipher ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Legitimate Reader ; Lightweight Block Cipher ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Ownership Transfer ; Software</subject><ispartof>Information and Communications Security, 2006, p.1-20</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-db10583879738f8b61ac9b678d0eb8810a1e09d15d4e630145ce0b2ea0f88bf03</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11935308_1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11935308_1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19183266$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Ning, Peng</contributor><contributor>Qing, Sihan</contributor><contributor>Li, Ninghui</contributor><creatorcontrib>Lim, Chae Hoon</creatorcontrib><creatorcontrib>Kwon, Taekyoung</creatorcontrib><title>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</title><title>Information and Communications Security</title><description>RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.</description><subject>Applied sciences</subject><subject>Block Cipher</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Legitimate Reader</subject><subject>Lightweight Block Cipher</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Ownership Transfer</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540494966</isbn><isbn>3540494960</isbn><isbn>9783540494973</isbn><isbn>3540494979</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkE1LAzEYhOMXWGsv_oK9CF5W33eTzcexaKuFQqXWc0h2k3a1ZkuyRfz3rlQQT3OYh5lhCLlCuEUAcYeoaElBajwiIyUkLRkwxZSgx2SAHDGnlKmTfx7np2QAFIpcCUbPyUVKbwBQCFUMyOyli21YZybU2bK1-9Rly-nsIRvvu40LXVOZrmlDNgnGbpuee3bRu6rLFp_BxbRpdtkqmpC8i5fkzJttcqNfHZLX6WR1_5TPF4-z-_E8rwpVdnltEUpJpeg3Sy8tR1Mpy4WswVkpEQw6UDWWNXOcArKycmALZ8BLaT3QIbk-5O5MqszW9_VVk_QuNh8mfmlUKGnBec_dHLjUW2HtorZt-540gv65Uv9dSb8BdP9frQ</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Lim, Chae Hoon</creator><creator>Kwon, Taekyoung</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</title><author>Lim, Chae Hoon ; Kwon, Taekyoung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-db10583879738f8b61ac9b678d0eb8810a1e09d15d4e630145ce0b2ea0f88bf03</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Block Cipher</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Legitimate Reader</topic><topic>Lightweight Block Cipher</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Ownership Transfer</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lim, Chae Hoon</creatorcontrib><creatorcontrib>Kwon, Taekyoung</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lim, Chae Hoon</au><au>Kwon, Taekyoung</au><au>Ning, Peng</au><au>Qing, Sihan</au><au>Li, Ninghui</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer</atitle><btitle>Information and Communications Security</btitle><date>2006</date><risdate>2006</risdate><spage>1</spage><epage>20</epage><pages>1-20</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540494966</isbn><isbn>3540494960</isbn><eisbn>9783540494973</eisbn><eisbn>3540494979</eisbn><abstract>RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11935308_1</doi><tpages>20</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information and Communications Security, 2006, p.1-20
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19183266
source Springer Books
subjects Applied sciences
Block Cipher
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Exact sciences and technology
Legitimate Reader
Lightweight Block Cipher
Memory and file management (including protection and security)
Memory organisation. Data processing
Ownership Transfer
Software
title Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T16%3A57%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Strong%20and%20Robust%20RFID%20Authentication%20Enabling%20Perfect%20Ownership%20Transfer&rft.btitle=Information%20and%20Communications%20Security&rft.au=Lim,%20Chae%20Hoon&rft.date=2006&rft.spage=1&rft.epage=20&rft.pages=1-20&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540494966&rft.isbn_list=3540494960&rft_id=info:doi/10.1007/11935308_1&rft_dat=%3Cpascalfrancis_sprin%3E19183266%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540494973&rft.eisbn_list=3540494979&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true