Information Security Practice and Experience
Author(s) -
Khaled Ouafi,
Raphaël C.W. Phan
Publication year - 2008
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
DOI - 10.1007/978-3-540-79104-1
Subject(s) - computer science , information security , computer security , information retrieval
The original publication is available at www.springerlink.comPrivacy is a major concern in RFID systems, especially with\udwidespread deployment of wireless-enabled interconnected personal de-\udvices e.g. PDAs and mobile phones, credit cards, e-passports, even cloth-\uding and tires. An RFID authentication protocol should not only allow\uda legitimate reader to authenticate a tag but it should also protect the\udprivacy of the tag against unauthorized tracing: an adversary should not\udbe able to get any useful information about the tag for tracking or dis-\udcovering the tag's identity. In this paper, we analyze the privacy of some\udrecently proposed RFID authentication protocols (2006 and 2007) and\udshow attacks on them that compromise their privacy. Our attacks con-\udsider the simplest adversaries that do not corrupt nor open the tags. We\uddescribe our attacks against a general untraceability model; from expe-\udrience we view this endeavour as a good practice to keep in mind when\uddesigning and analyzing security protocols
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom