2009
DOI: 10.1007/s00224-009-9236-0
|View full text |Cite
|
Sign up to set email alerts
|

RFID Authentication Efficient Proactive Information Security within Computational Security

Abstract: We consider repeated communication sessions between a RFID Tag (e.g., Radio Frequency Identification, RFID Tag) and a RFID Verifier. A proactive information theoretic security scheme is proposed. The scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. The Tag and the Verifier maintain a vector of n entries that is repeatedly refreshed by pairwise xoring entries, with a new vector of n entries that is r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Memory space on current low-cost tags is another limitation to the security of these approaches. An enhanced version of the PCSP protocol, presented in [18], aims at preventing active attacks against the protocol while keeping similar requirements, i.e., on-tag PRNG primitives and matrix operations.…”
Section: Low-overhead and Ultra-lightweight Solutionsmentioning
confidence: 99%
“…Memory space on current low-cost tags is another limitation to the security of these approaches. An enhanced version of the PCSP protocol, presented in [18], aims at preventing active attacks against the protocol while keeping similar requirements, i.e., on-tag PRNG primitives and matrix operations.…”
Section: Low-overhead and Ultra-lightweight Solutionsmentioning
confidence: 99%
“…However, we conjecture that our schemes are information-theoretically secure even in case of adaptive adversary. Furthermore, consider the case that an adversary is not able to listen to parts of the transmitted random string (e.g., [5]). Then, our schemes are secure in the presence of an adaptive adversary that misses a linear fraction of the transmitted random string.…”
Section: Discussionmentioning
confidence: 99%
“…Proactive event based systems have been studied by many researchers recently. Some examples include proactive management of transport processes [14] and proactive application event notification in sensor network [15]. Engel et al, proposed a proactive event processing framework based on CEP, PA and MDP [2,16].…”
Section: Related Workmentioning
confidence: 99%