2013
DOI: 10.1155/2013/710275
|View full text |Cite
|
Sign up to set email alerts
|

Untangling RFID Privacy Models

Abstract: The rise of wireless applications based on RFID has brought up major concerns on privacy. Indeed nowadays, when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level of the RFID application with a model. However, if the chosen model does not reflect the assumptions and requirements of the analyzed application, it may misevaluate its privacy level. Therefore, selecting the most approp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 28 publications
0
21
0
Order By: Relevance
“…One might expect that there should be easier approaches to obtaining secure authentication and key exchange protocols. Indeed, it seems that this problem, and even approaches offering enhanced privacy, have been discussed for a long time in the RFID community-see, for example, [Jue06] for an early survey and [CM13] for a more recent one. Identifying specific protocol solutions from that area and discussing their security and efficiency features, however, is beyond the scope of our analysis of PLAID here.…”
Section: Resultsmentioning
confidence: 99%
“…One might expect that there should be easier approaches to obtaining secure authentication and key exchange protocols. Indeed, it seems that this problem, and even approaches offering enhanced privacy, have been discussed for a long time in the RFID community-see, for example, [Jue06] for an early survey and [CM13] for a more recent one. Identifying specific protocol solutions from that area and discussing their security and efficiency features, however, is beyond the scope of our analysis of PLAID here.…”
Section: Resultsmentioning
confidence: 99%
“…He/she can also retransmit the messages maliciously to interrogate the tag or the back-end server in order to impersonate the reader or the victim tag. Several security and privacy issues and adversarial models are addressed in [22,19,5,31,15] in details. In this paper, we consider the following security and privacy notions in the security analysis of authentication protocols.…”
Section: Definition 5 (Discrete Logarithm Problem) Dlp Is Described Amentioning
confidence: 99%
“…If the normal execution securely updates the secret key of the reader and tag, this results in the privacy of the challenge tags for the type 2a and 2b protocols. The adversary A 3 can obtain the secret key of the target tag and easily break the privacy for type 0 protocols (e.g., SK-based protocol [9,5]). …”
Section: The Modified Forward Privacy Modelmentioning
confidence: 99%
“…Since 2003, many RFID authentication protocols have been investigated and several protocols have been shown to be insecure (see [5]). The security of these protocols is evaluated by using a cryptographic security model and one of the goals of the RFID authentication protocol is to satisfy this model.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation