PRICE TO PROVIDE RFID SECURITY AND PRIVACY?

Tim Good, Mohammed Benaissa

2008

Abstract

The applications for Radio frequency identification (RFID) systems are rapidly expanding and privacy concerns have been highlighted. Existing protocols fit into the challenge-response model and either fail in terms of privacy or have security vulnerabilities. A new symmetric key based protocol for RFID, named “PRICE: to Prevent RFID Insecurity Cryptography Essential”, is presented. This provides tag and reader authentication together with secure transfer of the tag’s identifier whilst still remaining within the challenge-response model. A security analysis of the protocol is given together with discussion of areas of weakness. The tag-borne security measures only require a single symmetric cipher encryption primitive.

Download


Paper Citation


in Harvard Style

Good T. and Benaissa M. (2008). PRICE TO PROVIDE RFID SECURITY AND PRIVACY? . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 209-213. DOI: 10.5220/0001925002090213

in Bibtex Style

@conference{secrypt08,
author={Tim Good and Mohammed Benaissa},
title={PRICE TO PROVIDE RFID SECURITY AND PRIVACY?},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={209-213},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001925002090213},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - PRICE TO PROVIDE RFID SECURITY AND PRIVACY?
SN - 978-989-8111-59-3
AU - Good T.
AU - Benaissa M.
PY - 2008
SP - 209
EP - 213
DO - 10.5220/0001925002090213