Title
Impossibility results for RFID privacy notions
Abstract
RFID systems have become increasingly popular and are already used in many real-life applications. Although very useful, RFIDs introduce privacy risks since they carry identifying information that can be traced. Hence, several RFID privacy models have been proposed. However, they are often incomparable and in part do not reflect the capabilities of real-world adversaries. Recently, Paise and Vaudenay presented a general RFID security and privacy model that abstracts and unifies most previous approaches. This model defines mutual authentication (between RFID tags and readers) and several privacy notions that capture adversaries with different tag corruption behavior and capabilities. In this paper, we revisit the model proposed by Paise and Vaudenay and investigate some subtle issues such as tag corruption aspects. We show that in their formal definitions tag corruption discloses the temporary memory of tags and leads to the impossibility of achieving both mutual authentication and any reasonable notion of RFID privacy in their model. Moreover, we show that the strongest privacy notion (narrow-strong privacy) cannot be achieved simultaneously with reader authentication even under the strong assumption that tag corruption does not disclose temporary tag states. Further, we show other impossibility results that hold if the adversary can manipulate an RFID tag such that it resets its state or when tags are stateless. Although our results are shown on the privacy definition by Paise and Vaudenay, they give insight to the difficulties of setting up a mature security and privacy model for RFID systems that aims at fulfilling the sophisticated requirements of real-life applications.
Year
DOI
Venue
2010
10.1007/978-3-642-17697-5_3
Transactions on Computational Science
Keywords
Field
DocType
rfid privacy notion,rfid tag,rfid privacy model,privacy definition,narrow-strong privacy,real-life application,rfid privacy,impossibility result,rfid system,privacy model,mutual authentication,privacy notion
Mutual authentication,Internet privacy,Authentication,Computer security,Computer science,Impossibility,Adversary,Stateless protocol,Privacy model,Corruption,Privacy software
Journal
Volume
ISSN
ISBN
11
0302-9743
3-642-17696-8
Citations 
PageRank 
References 
9
0.55
27
Authors
5
Name
Order
Citations
PageRank
Frederik Armknecht1100068.65
Ahmad-reza Sadeghi25463334.69
Alessandra Scafuro320514.00
Ivan Visconti461240.30
Christian Wachsmann557025.19