Privacy and Mutual Authentication under Temporary State Disclosure in RFID Systems
Close
Articolul precedent
Articolul urmator
244 5
Ultima descărcare din IBN:
2024-03-20 15:42
SM ISO690:2012
ȚIPLEA, Ferucio Laurențiu, HRISTEA, Cristian, BULAI, Rodica. Privacy and Mutual Authentication under Temporary State Disclosure in RFID Systems. In: Electronics, Communications and Computing, Ed. 12, 20-21 octombrie 2022, Chişinău. Chișinău: Tehnica-UTM, 2023, Editia 12, pp. 119-124. DOI: https://doi.org/10.52326/ic-ecco.2022/SEC.02
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Electronics, Communications and Computing
Editia 12, 2023
Conferința "Electronics, Communications and Computing"
12, Chişinău, Moldova, 20-21 octombrie 2022

Privacy and Mutual Authentication under Temporary State Disclosure in RFID Systems

DOI:https://doi.org/10.52326/ic-ecco.2022/SEC.02

Pag. 119-124

Țiplea Ferucio Laurențiu1, Hristea Cristian2, Bulai Rodica3
 
1 Alexandru Ioan Cuza University of Iaşi,
2 "Simion Stoilow" Institute of Mathematics of Romanian Academy,
3 Technical University of Moldova
 
 
Disponibil în IBN: 31 martie 2023


Rezumat

Privacy and mutual authentication are two significant requirements for real-life applications of RFID schemes. These two requirements have been studied for a long time only for adversaries that cannot corrupt the temporary internal state of the tags. Recently, however, it has been shown that corrupting the temporary internal state of the tag is practically possible. This raises the question: do the current RFID protocols that ensure mutual authentication and privacy keep these properties in the temporary state disclosure model? The answer is negative and thus it justifies the effort to propose new RFID protocols that are secure under temporary state disclosure. In this paper, we amply discuss how temporary state disclosure affects mutual authentication and privacy of RFID protocols, and illustrate this on two well-known protocols. We argue then in favor of using the PUF technology in order to achieve mutual authentication and a reasonable enough level of privacy under temporary state disclosure. We close by presenting two RFID schemes that achieve destructive privacy, one of the most important levels of privacy in the context of the physical corruption of tags.

Cuvinte-cheie
authentication, Privacy, PUF, RFID system