Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1102219.1102229acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

RFID security without extensive cryptography

Published: 07 November 2005 Publication History

Abstract

A Radio Frequency Identification Device (RFID) allows effective identification of a large number of tagged objects without physical or visual contact. RFID systems are a promising technology for supply chain management and inventory control. As individual item tagging becomes a reality, privacy concerns over RFID use come to the fore. The shared radio medium allow eavesdropping and unauthorized tag reading which poses threats to individual's privacy. Moreover, due to the mode of use of RFIDs, new threats emerge. For example, an intruder may be able to track the movement of an individual by repeatedly querying an RFID attached to the item that this individual carries. The limited size and cost considerations do not allow to implement conventional cryptographic systems on RFIDs. In this paper we propose an efficient RFID tag identification algorithm that incorporates reader-authentication. Our algorithm is secure against the anticipated threats to RFID systems. Our algorithm does not require computationally expensive cryptographic mechanisms, it relies on rather simple matrix multiplication. To further enhance the utility of our algorithm we propose a scheme that allows for the algorithm to carry out secure identification of multiple tags simultaneously.

References

[1]
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Marc Joye and Jean-Jacques Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems CHES 2004, volume 3156 of Lecture Notes in Computer Science, pages 357--370, Boston, Massachusetts, USA, August 2004. IACR, Springer-Verlag.
[2]
Klaus Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, 2nd edition, MAY 2003. Includes bibliographical references and index.
[3]
Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson. Universal re-encryption for mixnets. In Tatsuaki Okamoto, editor, The Cryptographers' Track at the RSA Conference - CT-RSA, volume 2964 of Lecture Notes in Computer Science, San Francisco, California, USA, February 2004. Springer-Verlag.
[4]
Dirk Henrici and Paul Müller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Ravi Sandhu and Roshan Thomas, editors, Workshop on Pervasive Computing and Communications Security PerSec 2004, pages 149153, Orlando, Florida, USA, March 2004. IEEE, IEEE Computer Society.
[5]
Ari Juels. Minimalist cryptography for low-cost RFID tags. In Carlo Blundo and Stelvio Cimato, editors, The Fourth International Conference on Security in Communication Networks - SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 149--164, Amal, Italia, September 2004. Springer-Verlag.
[6]
Ari Juels and John Brainard. Soft blocking: Flexible blocker tags on the cheap. In Sabrina De Capitani di Vimercati and Paul Syverson, editors, Workshop on Privacy in the Electronic Society - WPES, pages 1--7, Washington, DC, USA, October 2004. ACM, ACM Press.
[7]
Ari Juels and Ravikanth Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In FC: International Conference on Financial Cryptography. LNCS, Springer-Verlag, 2003.
[8]
Ari Juels, Ronald L. Rivest, and Michael Szydlo. The blocker tag: selective blocking of RFID tags for consumer privacy. In Vijay Atluri and Peng Liu, editors, Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS-03), pages 103--111, New York, October 27--30 2003. ACM Press.
[9]
David Molnar and David Wagner. Privacy and security in library RFID: issues, practices, and architectures. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 210--219, New York, NY, USA, 2004. ACM Press.
[10]
William Stallings. Cryptography and network security: principles and practice. Prentice-Hall, Englewood Cliffs, NJ 07632, USA, second edition, 1999.
[11]
Istv An Vajda and Levente Butty An. Lightweight authentication protocols for low-cost RFID tags, August 06 2003.
[12]
Stephen Weis, Sanjay Sarma, Ronald Rivest, and Daniel Engels. Security and privacy aspects of low-cost radio frequency identification systems. In Dieter Hutter, G. unter Müller, Werner Stephan, and Markus Ullmann, editors, International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in Computer Science, Boppard, Germany, March 2003. Springer-Verlag.

Cited By

View all
  • (2022)IoT in Medical ScienceEmerging Technologies in Data Mining and Information Security10.1007/978-981-19-4193-1_30(313-326)Online publication date: 29-Sep-2022
  • (2021)Closed-loop and open-loop authentication protocols for blockchain-based IoT systemsInformation Processing and Management: an International Journal10.1016/j.ipm.2021.10256858:4Online publication date: 1-Jul-2021
  • (2019)An radio-frequency identification security authentication mechanism for Internet of things applicationsInternational Journal of Distributed Sensor Networks10.1177/155014771986222315:7(155014771986222)Online publication date: 9-Jul-2019
  • Show More Cited By

Index Terms

  1. RFID security without extensive cryptography

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
      November 2005
      136 pages
      ISBN:1595932275
      DOI:10.1145/1102219
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. RFID
      2. privacy
      3. security

      Qualifiers

      • Article

      Conference

      CCS05
      Sponsor:

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)IoT in Medical ScienceEmerging Technologies in Data Mining and Information Security10.1007/978-981-19-4193-1_30(313-326)Online publication date: 29-Sep-2022
      • (2021)Closed-loop and open-loop authentication protocols for blockchain-based IoT systemsInformation Processing and Management: an International Journal10.1016/j.ipm.2021.10256858:4Online publication date: 1-Jul-2021
      • (2019)An radio-frequency identification security authentication mechanism for Internet of things applicationsInternational Journal of Distributed Sensor Networks10.1177/155014771986222315:7(155014771986222)Online publication date: 9-Jul-2019
      • (2019)Inductive Method for Evaluating RFID Security ProtocolsWireless Communications & Mobile Computing10.1155/2019/21384682019Online publication date: 1-Jan-2019
      • (2019)Breaking anonymity of some recent lightweight RFID authentication protocolsWireless Networks10.1007/s11276-018-1717-025:3(1235-1252)Online publication date: 1-Apr-2019
      • (2019)Review of different classes of RFID authentication protocolsWireless Networks10.1007/s11276-017-1638-325:3(961-974)Online publication date: 1-Apr-2019
      • (2019)Security and Privacy in Smart Cities: Issues and Current SolutionsSmart Technologies and Innovation for a Sustainable Future10.1007/978-3-030-01659-3_37(317-323)Online publication date: 9-Jan-2019
      • (2018)A lightweight mutual authentication approach for RFID tags in IoT devicesInternational Journal of Networking and Virtual Organisations10.5555/3272225.327222618:2(97-111)Online publication date: 1-Jan-2018
      • (2018)Study Of RFID Authentication Protocols2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)10.1109/ICCUBEA.2018.8697573(1-4)Online publication date: Aug-2018
      • (2018)Security for 4G and 5G cellular networksJournal of Network and Computer Applications10.1016/j.jnca.2017.10.017101:C(55-82)Online publication date: 1-Jan-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media