Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography
dc.cclicence | CC-BY-NC | en |
dc.contributor.author | Bingol, Muhammed Ali | |
dc.contributor.author | Avoine, Gildas | |
dc.contributor.author | Carpent, Xavier | |
dc.contributor.author | Ors, Berna | |
dc.date.acceptance | 2012-08-03 | |
dc.date.accessioned | 2020-06-30T14:38:37Z | |
dc.date.available | 2020-06-30T14:38:37Z | |
dc.date.issued | 2013-10-10 | |
dc.description | The Publisher's final version can be found by following the DOI link | en |
dc.description.abstract | The recent advent of ubiquitous technologies has raised an important concern for citizens: the need to protect their privacy. So far, this wish was not heard of industrials, but national and international regulation authorities, as the European Commission recently published some guidelines to enforce customers' privacy in RFID systems: "Privacy by designâ is the way to be followed as stated in EC Recommendation of 12.5.2009. Research on privacy is an active domain but there is still a wide gap between theory and everyday life's applications. Filling this gap will require academia to design protocols and algorithms that fit the real-life constraints. In this paper, we provide a comprehensive analysis of privacy-friendly authentication protocols devoted to RFID that: 1) are based on well-established symmetric-key cryptographic building blocks; 2) require a reader complexity lower than O(N) where N is the number of provers in the system. These two properties are sine qua non conditions for deploying privacy-friendly authentication protocols in large-scale applications, for example, access control in mass transportation. We describe existing protocols fulfilling these requirements and point out their drawbacks and weaknesses. We especially introduce attacks on CHT, CTI,YA-TRAP*, and the variant of OSK/AO with mutual authentication. We also raise that some protocols, such as O-RAP, O-FRAP, and OSK/BF, are not resistant to timing attacks. Finally, we select some candidates that are, according to our criteria, the most appropriate ones for practical uses. | en |
dc.exception.ref2021codes | 252c | en |
dc.funder | No external funder | en |
dc.identifier.citation | Avoine, G., Bingol, M.A. Carpent, X., Berna, S., Yalcin, O. (2013) Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography. IEEE Transactions on Mobile Computing,12(10), pp. 2037–2049. | en |
dc.identifier.doi | https://doi.org/10.1109/tmc.2012.174 | |
dc.identifier.issn | 1536-1233 | |
dc.identifier.uri | https://dora.dmu.ac.uk/handle/2086/19881 | |
dc.language.iso | en | en |
dc.peerreviewed | Yes | en |
dc.publisher | IEEE | en |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.subject | Protocols | en |
dc.subject | Privacy | en |
dc.subject | Authentication | en |
dc.subject | RFID | en |
dc.subject | Complexity theory | en |
dc.subject | cryptography | en |
dc.subject | attacks | en |
dc.title | Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography | en |
dc.type | Article | en |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Bingol_Privacy_friendly_RFID.pdf
- Size:
- 1.2 MB
- Format:
- Adobe Portable Document Format
- Description:
- Main Article - Accepted manuscript
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 4.2 KB
- Format:
- Item-specific license agreed upon to submission
- Description: