Third IEEE International Conference on Pervasive Computing and Communications Workshops
DOI: 10.1109/percomw.2005.12
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable and Provably Secure Hash-Based RFID Protocol

Abstract: The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been found to break them. An approach by Ohkubo, Suzuki and Kinoshita using an internal refreshment mechanism seems to protect privacy well but is not scalable. We introduce a specific time-memory trade-off that removes the scalability issue of this scheme. Additionally we prove that the system truly offers privacy and even forward privac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
167
0

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 236 publications
(169 citation statements)
references
References 9 publications
0
167
0
Order By: Relevance
“…In order to prevent this kind of vulnerability, in our protocols we use a group secret key k group , which is shared by all the tags belonging to that group. 3 A more serious weakness concerns the nature of the "proof" P AB generated by the tags: this is not a proof that tag A and tag B were scanned simultaneously while in the presence of an authorized reader. Indeed, one cannot exclude the possibility that P AB was generated while the tags were in the presence of a rogue reader, and that at a later time P AB was replayed by a corrupted tag (impersonating successively tag A and tag B ) in the presence of the authorized reader.…”
Section: 1mentioning
confidence: 99%
“…In order to prevent this kind of vulnerability, in our protocols we use a group secret key k group , which is shared by all the tags belonging to that group. 3 A more serious weakness concerns the nature of the "proof" P AB generated by the tags: this is not a proof that tag A and tag B were scanned simultaneously while in the presence of an authorized reader. Indeed, one cannot exclude the possibility that P AB was generated while the tags were in the presence of a rogue reader, and that at a later time P AB was replayed by a corrupted tag (impersonating successively tag A and tag B ) in the presence of the authorized reader.…”
Section: 1mentioning
confidence: 99%
“…There have been many papers which are hash-based [2,4,3,5,7,9,14,15,17], pseudonym-based [1,12], zero knowledge-based [16] using PUF(Physical Unclonable Function), and tree-based protocol [8] using pseudonym generator that attempts to address the security concerns raised as using RFID tags, but it is believed that there is no perfect protocol that avoids all of the threats with reasonably low cost until now. Hash Lock Scheme [14](denoted by "HLS") is based on one-way hash function; HLS is traceable.…”
Section: Previous Workmentioning
confidence: 99%
“…The identification value received by the reader is then searched in the back-end in hash chains associated to each tag in the system. 2 A time-memory trade-off speeding up the back-end computations at the expense of pre-computations was proposed for the original scheme and some of its variants [6].…”
Section: Introductionmentioning
confidence: 99%