2013
DOI: 10.1109/tmc.2012.174
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography

Abstract: The recent advent of ubiquitous technologies has raised an important concern for citizens: the need to protect their privacy. So far, this wish was not heard of industrials, but national and international regulation authorities, as the European Commission recently published some guidelines to enforce customers' privacy in RFID systems: "Privacy by design" is the way to be followed as stated in EC Recommendation of 12.5.2009. Research on privacy is an active domain but there is still a wide gap between theory a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(34 citation statements)
references
References 57 publications
(121 reference statements)
0
34
0
Order By: Relevance
“…Indeed, and as illustrated in our comparative study, some works take into consideration the conformity of their solutions to RFID standards [12,18,19,20,20,23,24]. Intuitively, before designing any secure RFID solution it is crucial to verify whether this solution respects RFID standards or not.…”
Section:  Solution Categorymentioning
confidence: 99%
“…Indeed, and as illustrated in our comparative study, some works take into consideration the conformity of their solutions to RFID standards [12,18,19,20,20,23,24]. Intuitively, before designing any secure RFID solution it is crucial to verify whether this solution respects RFID standards or not.…”
Section:  Solution Categorymentioning
confidence: 99%
“…Our protocol uses one master key shared by all tags. In [10], it is stated that a protocol using only one master key has constant-time identification, but no privacy/security as soon as one tag is compromised. Our protocol provides resistance against tag compromising attack by using PUFs as a secure storage to keep secrets of the tag.…”
Section: Contribution and Outlinementioning
confidence: 99%
“…Public-key cryptography that can be used to solve these problems. Although some recent studies such as [8,9] show that implementation of elliptic curve cryptography on RFID tags is feasible, it is generally acknowledged that PKC cannot be applied to RFID systems because RFID tags are very restricted devices in terms of storage and computation [10,11]. Therefore, symmetrickey cryptography are used in design of security protocols for RFID systems.…”
Section: Introductionmentioning
confidence: 99%
“…A lot of RFID protocols were proposed and developed [2][3][4]. Their efficiency heavily depends on the way of identification of tags associated with objects.…”
Section: Introductionmentioning
confidence: 99%