2nd International ICST Conference on Security and Privacy in Comunication Networks

Research Article

Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols

  • @INPROCEEDINGS{10.1109/SECCOMW.2006.359563,
        author={Mike  Burmester and Tri  van Le and Breno  de Medeiros},
        title={Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols},
        proceedings={2nd International ICST Conference on Security and Privacy in Comunication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2007},
        month={5},
        keywords={},
        doi={10.1109/SECCOMW.2006.359563}
    }
    
  • Mike Burmester
    Tri van Le
    Breno de Medeiros
    Year: 2007
    Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOMW.2006.359563
Mike Burmester1,*, Tri van Le1,*, Breno de Medeiros1,*
  • 1: Florida State University, Department of Computer Science, Tallahassee
*Contact email: burmester@cs.fsu.edu, levan@cs.fsu.edu, breno@cs.fsu.edu

Abstract

This paper examines two unlinkably anonymous, simple RFID identification protocols that require only the ability to evaluate hash functions and generate random values, and that are provably secure against Byzantine adversaries. The main contribution is a universally composable security model tuned for RFlD applications. By making specific setup, communication, and concurrency assumptions that are realistic in the RFID application setting, we arrive at a model that guarantees strong security and availability properties, while still permitting the design of practical RFID protocols. We show that two protocols are provably secure within the new security model. Our proofs do not employ random oracles - the protocols are shown to be secure in the standard model under the assumption of existence of pseudo-random function families