Mobile Lightweight Wireless Systems. Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers

Research Article

Wide–Weak Privacy–Preserving RFID Authentication Protocols

Download
334 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-16644-0_23,
        author={Yong Lee and Lejla Batina and Dave Singel\^{e}e and Ingrid Verbauwhede},
        title={Wide--Weak Privacy--Preserving RFID Authentication Protocols},
        proceedings={Mobile Lightweight Wireless Systems. Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers},
        proceedings_a={MOBILIGHT},
        year={2012},
        month={10},
        keywords={Authentication Protocol Privacy Tracking Attack Elliptic Curve Cryptography RFID},
        doi={10.1007/978-3-642-16644-0_23}
    }
    
  • Yong Lee
    Lejla Batina
    Dave Singelée
    Ingrid Verbauwhede
    Year: 2012
    Wide–Weak Privacy–Preserving RFID Authentication Protocols
    MOBILIGHT
    Springer
    DOI: 10.1007/978-3-642-16644-0_23
Yong Lee1,*, Lejla Batina,*, Dave Singelée2,*, Ingrid Verbauwhede2,*
  • 1: Samsung Electronics Research and Development
  • 2: IBBT – COSIC, Katholieke Universiteit Leuven
*Contact email: yklee93@kg21.net, lejla@cs.ru.nl, Dave.Singelee@esat.kuleuven.be, Ingrid.Verbauwhede@esat.kuleuven.be

Abstract

The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Cryptographic techniques are commonly used to enable tag-to-server authentication while protecting privacy. Unfortunately, these algorithms and their corresponding implementations are difficult to adapt to the extreme conditions implied by the use of RFID. The extremely limited budget for energy and area do not allow the use of traditional cryptography.