Privacy leakage in access mode: Revisiting private RFID Authentication protocols

Qingsong Yao, Jinsong Han, Yong Qi, Lei Yang, Yunhao Liu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

2 Citations (Scopus)

Abstract

Existing RFID Privacy-Preserving Authentication (PPA) solutions mainly focus on the design of crypto based interactive protocols between readers and tags. Although the cryptographic mechanisms enable randomization and enhance protocol-level privacy, the access mode in RFID systems is less random and may leak private information. We introduce a new attack based on such privacy leakage in access mode, where we show that the mainstream RFID PPA protocols, including the linear, tree-based, and synchronization-based solutions, are not private. We also show that this new attack is easy to conduct, e.g., we can track tags that employ typical tree-based PPA protocols without the need of compromising tags. We discuss the applicability of the attack. Moreover, we provide useful recommendations to strengthen existing PPA protocols in defending against such attacks. The simulation results demonstrate the practicability and effectiveness of this attack.
Original languageEnglish
Title of host publicationProceedings - 2011 International Conference on Parallel Processing, ICPP 2011
Pages713-721
Number of pages9
DOIs
Publication statusPublished - 7 Nov 2011
Externally publishedYes
Event40th International Conference on Parallel Processing, ICPP 2011 - Taipei City, Taiwan
Duration: 13 Sept 201116 Sept 2011

Conference

Conference40th International Conference on Parallel Processing, ICPP 2011
Country/TerritoryTaiwan
CityTaipei City
Period13/09/1116/09/11

Keywords

  • Access mode
  • Authentication protocol
  • Privacy leakage
  • Proven private
  • RFID

ASJC Scopus subject areas

  • Software
  • General Mathematics
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Privacy leakage in access mode: Revisiting private RFID Authentication protocols'. Together they form a unique fingerprint.

Cite this