2006
DOI: 10.1007/11693383_20
|View full text |Cite
|
Sign up to set email alerts
|

Reducing Time Complexity in RFID Systems

Abstract: Abstract. Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the productivity or to strengthen the security. Specific identification protocols based on symmetric challengeresponse have been developed in order to assure the privacy of the device bearers. Although these protocols fit the devices' constraints, they always suffer from a large time complexity. Existing protocols require O(n) crypto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
158
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 168 publications
(162 citation statements)
references
References 12 publications
0
158
0
Order By: Relevance
“…The trade-off that exists between efficiency and security in tree-based protocols was already pointed out by Avoine [1], with respect to Molnar's original trees. Because tags share their partial keys, if one tag is compromised (i.e.…”
Section: Related Workmentioning
confidence: 93%
See 2 more Smart Citations
“…The trade-off that exists between efficiency and security in tree-based protocols was already pointed out by Avoine [1], with respect to Molnar's original trees. Because tags share their partial keys, if one tag is compromised (i.e.…”
Section: Related Workmentioning
confidence: 93%
“…Examples are OSK (by Ohkubo, Suzuki and Kinoshita in [14]) and Yeo's protocol [16]. In [1], Avoine et al suggest applying time-memory trade-offs (based on Hellmann tables [9]) to hash-chain protocols (namely OSK and an improved version thereof). In [2] they extend this trade-off with socalled rainbow tables and checkpoints to further improve efficiency.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A paradigmatic example of an RFID identification protocol providing some forward privacy is the OSK scheme [39,40] which relies on the use by the tag of two one-way hash functions. 1 Variants of the OSK scheme turning it into a forward private authentication protocol have been proposed in [5], thus making it resistant to replay attacks. 2 It was however noticed that the OSK protocol and its authentication variants are vulnerable to Denial of Service attacks (DoS) that desynchronize a tag from the system.…”
Section: Introductionmentioning
confidence: 99%
“…The problem of the above described tree-based approach is that upper level keys in the tree are used by many members, and therefore, if a member is compromised and its keys become known to the adversary, then the adversary gains partial knowledge of the key of other members too [1]. This obviously reduces the privacy provided by the system to its members, since by observing the authentication of an uncompromised member, the adversary can recognize the usage of some compromised keys, and therefore its uncertainty regarding the identity of the authenticating member is reduced (it may be able to determine which subtree the member belongs to).…”
Section: Introductionmentioning
confidence: 99%