Abstract | ||
---|---|---|
Vaudenay presented in [ASIACRYPT 2007] a general RFID security and privacy model that abstracts some previous works in a single, concise, and much more understandable framework. He introduced eight distinct notions of privacy, corresponding to adversaries of different strength, and proved some possibility and impossibility results for such privacy notions. However, some interesting problems as: 1) achieving stronger privacy using low-cost tags (i.e., tags that usually can not perform public-key cryptography), 2) achieving stronger privacy in presence of side-channel attacks (e.g., DoS attacks, detection of the outputs of identification protocols), and 3) achieving stronger privacy under standard complexity-theoretic assumptions, are still left open.In this paper, we address the above problems and give two contributions.First of all we show that Vaudenay's privacy notions are impossible to achieve in presence of DoS attacks. Therefore, we extend the model to better reflect the real-world scenario, where these attacks are easy to mount (e.g., by physically destroying/making inactive tags). More precisely, we refine Vaudenay's privacy model to deal with DoS and DoS-like attacks, and introduce an additional privacy notion, referred to as semi-destructive privacy, which takes into account hardware features of some real-world tags. Then, we show an efficient RFID protocol that, by only using symmetric-key cryptography, satisfies the notion of semi-destructive privacy, under standard complexity-theoretic assumptions. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1007/978-3-642-05434-1_9 | ALGOSENSORS |
Keywords | Field | DocType |
dos attack,semi-destructive privacy,general rfid security,privacy model,distinct notion,revisiting dos attacks,rfid-enabled networks,efficient rfid protocol,standard complexity-theoretic assumption,stronger privacy,privacy notion,additional privacy notion,satisfiability,side channel attacks,public key cryptography | Denial-of-service attack,Computer science,Cryptography,Computer security,Computer network,Random oracle,Impossibility,Forward privacy,Privacy model,Privacy software | Conference |
Volume | ISSN | Citations |
5804 | 0302-9743 | 7 |
PageRank | References | Authors |
0.59 | 10 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Paolo D'Arco | 1 | 286 | 23.51 |
Alessandra Scafuro | 2 | 205 | 14.00 |
Ivan Visconti | 3 | 612 | 40.30 |