Deploying OSK on Low-Resource Mobile Devices

Date

2013-11-01

Advisors

Journal Title

Journal ISSN

ISSN

Volume Title

Publisher

Springer

Type

Conference

Peer reviewed

Yes

Abstract

It is a popular challenge to design authentication protocols that are both privacy-friendly and scalable. A large body of literature in RFID is dedicated to that goal, and many inventive mechanisms have been suggested to achieve it. However, to the best of our knowledge, none of these protocols have been tested so far in practical scenarios. In this paper, we present an implementation of the OSK protocol, a scalable and privacy-friendly authentication protocol, using a variant by Avoine and Oechslin that accommodates it to time-memory trade-offs. We show that the OSK protocol is suited to certain real-life scenarios, in particular when the authentication is performed by low-resource mobile devices. The implementation, done on an NFC-compliant cellphone and a ZC7.5 contactless tag, demonstrates the practicability and efficiency of the OSK protocol and illustrates that privacy-by-design is achievable in constrained environments.

Description

The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link

Keywords

RFID authentication, Implementation, Time-memory trade offs, Privacy

Citation

Avoine G., Bingöl M.A., Carpent X., Kardaş S. (2013) Deploying OSK on Low-Resource Mobile Devices. In: Hutter M., Schmidt J.M. (Eds.) Radio Frequency Identification. RFIDSec 2013. Berlin, Heidelberg: Springer.

Rights

Research Institute

Cyber Technology Institute (CTI)