Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security 2008
DOI: 10.1145/1368310.1368352
|View full text |Cite
|
Sign up to set email alerts
|

Mutual authentication in RFID

Abstract: In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption is allowed, we prove that secure protocols cannot protect privacy unless we assume tags have a temporary memory which vanishes by itself. Under this assumption, we study several protocols. We enrich a few basic protocols to get secure mutual authentication RFI… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
148
0
1

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 119 publications
(150 citation statements)
references
References 14 publications
1
148
0
1
Order By: Relevance
“…These requirements are along the same lines as recent research on RFID security such as [8,18,15]. Now, we present ROTIV in §4, followed by our privacy and security models in §5.…”
Section: Tag T Imentioning
confidence: 92%
See 3 more Smart Citations
“…These requirements are along the same lines as recent research on RFID security such as [8,18,15]. Now, we present ROTIV in §4, followed by our privacy and security models in §5.…”
Section: Tag T Imentioning
confidence: 92%
“…Note that protocols presented above [12,6,17] are designed to be forward privacy preserving against a strong adversary that continuously monitors tags [8,18,15]. However, in order to achieve both constant time authentication and denial of service resistance while the tag only computes hash functions, ROTIV must consider a more realistic adversary model.…”
Section: Tag T Imentioning
confidence: 99%
See 2 more Smart Citations
“…Our attacks do not even need the strong requirement of corrupting tags [26,13,27,17,16,28,22]. To the best of our knowledge, attacks presented here are the first known analyses of ProbIP [8], MARP [14], Auth2 [24], YA-TRAP+ [4], O-TRAP [4] and RIPP-FS [9].…”
Section: Introductionmentioning
confidence: 99%