Comparing two security models for RFID
Închide
Articolul precedent
Articolul urmator
144 1
Ultima descărcare din IBN:
2023-07-17 15:29
SM ISO690:2012
RADU, Rareș-Aurelian. Comparing two security models for RFID. In: Electronics, Communications and Computing, Ed. 12, 20-21 octombrie 2022, Chişinău. Chișinău: Tehnica-UTM, 2023, Editia 12, pp. 177-182. DOI: https://doi.org/10.52326/ic-ecco.2022/CS.06
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Electronics, Communications and Computing
Editia 12, 2023
Conferința "Electronics, Communications and Computing"
12, Chişinău, Moldova, 20-21 octombrie 2022

Comparing two security models for RFID

DOI:https://doi.org/10.52326/ic-ecco.2022/CS.06

Pag. 177-182

Radu Rareș-Aurelian
 
Alexandru Ioan Cuza University of Iaşi
 
 
Disponibil în IBN: 3 aprilie 2023


Rezumat

Radio Frequency Identification Technology became more and more involved in authentication processes over the years and is still rising. Security in this context needs to be strongly ensured, hence security models have a crucial role motivated by the fact that any entity with the right tools can interfere or eavesdrop in the communication process between a tag and a reader. The two most relevant, complete and worth mentioning models at this hour are Serge Vaudenay’s model based on the introduced ‘blinder’ notion and the HPVP model of J. Hermans, R. Peeters and B. Preenel’s based on the left-or-right indistinguishability notion. We provide a comparison between these two models that highlights not only the differences and the similarities, but also the elements that make each model unique along with the tag corruption aspects and the different privacy levels achieved by each model regarding both symmetric and asymmetric cryptography.