Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware

作者: Yong Ki Lee , Lejla Batina , Dave Singelee , Bart Preneel , Ingrid Verbauwhede

DOI: 10.1007/978-3-642-14452-3_11

关键词: Public-key cryptographyEngineeringAccess controlAutomationAuthentication protocolRoad pricingPhysical unclonable functionComputer securityTelecommunicationsSupply chainRadio-frequency identification

摘要: Recently, the use of RFID (radio frequency identification) technology has expanded enormously. It was developed in middle twentieth century and is today being applied many areas: supply chains, access control, electronic passports, health care, road pricing, etc. The advantage over bar-code that it does not require direct line-of-sight reading tags can be interrogated at greater distances. also enables automation some control processes, which results a significant gain terms time cost.

参考文章(48)
Boris Danev, Srdjan Čapkun, Thomas S. Heydt-Benjamin, Physical-layer identification of RFID devices usenix security symposium. pp. 199- 214 ,(2009)
Jihwan Lim, Heekuck Oh, Sangjin Kim, A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection information security practice and experience. pp. 278- 289 ,(2008) , 10.1007/978-3-540-79104-1_20
David Molnar, Andrea Soppera, David Wagner, A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags international conference on selected areas in cryptography. pp. 276- 290 ,(2005) , 10.1007/11693383_19
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm Lecture Notes in Computer Science. pp. 357- 370 ,(2004) , 10.1007/978-3-540-28632-5_26
Nicholas J. Hopper, Manuel Blum, Secure Human Identification Protocols international conference on the theory and application of cryptology and information security. pp. 52- 66 ,(2001) , 10.1007/3-540-45682-1_4
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Tatsuaki Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes international cryptology conference. pp. 31- 53 ,(1992) , 10.1007/3-540-48071-4_3
Julien Bringer, Hervé Chabanne, Thomas Icart, Cryptanalysis of EC-RAC, a RFID Identification Protocol cryptology and network security. pp. 149- 161 ,(2008) , 10.1007/978-3-540-89641-8_11
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
C. P. Schnorr, Efficient Identification and Signatures for Smart Cards international cryptology conference. pp. 239- 252 ,(1989) , 10.1007/0-387-34805-0_22