RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most important security requirement in designing RFID protocols is to ensure untraceability of RFID tags by unauthorized parties (even with knowledge of a tag secret due to no physical security of low-cost RFID tags). Previous work in this direction mainly focuses on backward untraceability, requiring that compromise of a tag secret should not help identify the tag from past communication transcripts. However, in this paper, we argue that forward untraceability, i.e., untraceability of future events even with knowledge of a current tag secret, should be considered as an equally or even more important security property in RFID protocol designs. Furthermore, RFID tags may often change hands during their lifetime and thus the problem of tag ownership transfer should be dealt with as another key issue in RFID privacy problems; once ownership of a tag is transferred to another party, the old owner should not be able to read the tag any more. It is rather obvious that complete transfer of tag ownership is possible only if some degree of forward untraceability is provided. We propose a strong and robust RFID authentication protocol satisfying both forward and backward untraceability and enabling complete transfer of tag ownership.
|Title of host publication||Information and Communications Security - 8th International Conference, ICICS 2006, Proceedings|
|Editors||Peng Ning, Sihan Qing, Ninghui Li|
|Number of pages||20|
|Publication status||Published - 2006|
|Event||8th International Conference on Information and Communications Security, ICICS 2006 - Raleigh, United States|
Duration: 2006 Dec 4 → 2006 Dec 7
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Other||8th International Conference on Information and Communications Security, ICICS 2006|
|Period||06/12/4 → 06/12/7|
Bibliographical noteFunding Information:
★ Research by the 2nd author was supported by grant No. R01-2005-000-11261-0 from Korea Science and Engineering Foundation in Ministry of Science & Technology.
Research by the 2nd author was supported by grant No. R01-2005-000-11261-0 from Korea Science and Engineering Foundation in Ministry of Science & Technology.
© Springer-Verlag Berlin Heidelberg 2006.
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Computer Science(all)