Surrey researchers Sign in
Insider Attacks and Privacy of RFID Protocols
Book chapter   Peer reviewed

Insider Attacks and Privacy of RFID Protocols

Ton van Deursen and Saša Radomirović
Public Key Infrastructures, Services and Applications, pp.91-105
Lecture Notes in Computer Science, Springer Berlin Heidelberg
2012

Abstract

Elliptic Curve Encryption Scheme Hash Function Inside Attack Protocol Execution
We discuss insider attacks on RFID protocols with a focus on RFID tag privacy and demonstrate such attacks on published RFID protocols. In particular, we show attacks on a challenge-response protocol with IND-CCA1 encryption and on the randomized hashed GPS protocol. We then show that IND-CCA2 encryption can be used to prevent insider attacks and present a protocol secure against insider attacks. The protocol is based solely on elliptic-curve operations.

Metrics

11 Record Views

Details

Usage Policy