Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Guest editors: Yingjiu LiGuest-Editor and Jianying ZhouGuest-Editor
Article type: Research Article
Authors: Halevi, Tziporaa; * | Saxena, Nitesha | Halevi, Shaib
Affiliations: [a] Polytechnic Institute of New York University, New York, NY, USA. E-mails: thalev01@students.poly.edu, nsaxena@poly.edu | [b] IBM Research, New York, NY, USA. E-mail: shaih@alum.mit.edu
Correspondence: [*] Corresponding author: Tzipora Halevi, Polytechnic Institute of New York University, New York, NY, USA. Tel./Fax: +1 718 260 3116/3609; E-mail: thalev01@students.poly.edu.
Abstract: An RFID reader must authenticate its designated tags in order to prevent tag forgery and counterfeiting. At the same time, due to privacy requirements of many applications, a tag should remain anonymous and untraceable to an adversary during the authentication process. In this paper, we propose an “HB-like” protocol for privacy-preserving authentication of RFID tags. Previous protocols for privacy-preserving authentication were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing traditional PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader-side load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree-traversal stage through usage of a “light version” of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#. We also present analytical and simulation results comparing our method with prior proposals in terms of computation, communication and memory overheads.
Keywords: HB family protocols, privacy-preserving authentication
DOI: 10.3233/JCS-2010-0404
Journal: Journal of Computer Security, vol. 19, no. 2, pp. 343-363, 2011
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl