Privacy and mutual authentication under temporary state disclosure in RFID Systems
Închide
Articolul precedent
Articolul urmator
181 0
SM ISO690:2012
ȚIPLEA, Ferucio Laurențiu, HRISTEA, Cristian, BULAI, Rodica. Privacy and mutual authentication under temporary state disclosure in RFID Systems. In: Electronics, Communications and Computing, Ed. 12, 20-21 octombrie 2022, Chişinău. Chișinău: Tehnica-UTM, 2023, Editia 12, pp. 22-22a.
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Electronics, Communications and Computing
Editia 12, 2023
Conferința "Electronics, Communications and Computing"
12, Chişinău, Moldova, 20-21 octombrie 2022

Privacy and mutual authentication under temporary state disclosure in RFID Systems


Pag. 22-22a

Țiplea Ferucio Laurențiu1, Hristea Cristian2, Bulai Rodica3
 
1 Alexandru Ioan Cuza University of Iaşi,
2 "Simion Stoilow" Institute of Mathematics of Romanian Academy,
3 Technical University of Moldova
 
 
Disponibil în IBN: 29 martie 2023


Rezumat

Privacy and mutual authentication are two significant requirements for real-life applications of RFID schemes. These two requirements have been studied for a long time only for adversaries that cannot corrupt the temporary internal state of the tags. Recently, however, it has been shown that corrupting the temporary internal state of the tag is practically possible. This raises the question: do the current RFID protocols that ensure mutual authentication and privacy keep these properties in the temporary state disclosure model? The answer is negative and thus it justifies the effort to propose new RFID protocols that are secure under temporary state disclosure. In this paper, we amply discuss how temporary state disclosure affects mutual authentication and privacy of RFID protocols, and illustrate this on two well-known protocols. We argue then in favor of using the PUF technology in order to achieve mutual authentication and a reasonable enough level of privacy under temporary state disclosure. We close by presenting two RFID schemes that achieve destructive privacy, one of the most important levels of privacy in the context of the physical corruption of tags.