Abstract
We discuss insider attacks on RFID protocols with a focus on RFID tag privacy and demonstrate such attacks on published RFID protocols. In particular, we show attacks on a challenge-response protocol with IND-CCA1 encryption and on the randomized hashed GPS protocol. We then show that IND-CCA2 encryption can be used to prevent insider attacks and present a protocol secure against insider attacks. The protocol is based solely on elliptic-curve operations.
Original language | English |
---|---|
Title of host publication | Public Key Infrastructures, Services, and Applications |
Subtitle of host publication | 8th European Workshop, EuroPKI 2011 Leuven, Belgium, September 15-16, 2011 Revised Selected Papers |
Editors | Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul |
Place of Publication | Berlin |
Publisher | Springer Verlag |
Pages | 91-105 |
Number of pages | 15 |
ISBN (Electronic) | 9783642298042 |
ISBN (Print) | 9783642298035 |
DOIs | |
Publication status | Published - 2012 |
Event | 8th European Workshop on Public Key Infrastructures, Services, and Applications - K.U.Leuven Nieuwe Valk, Leuven, Belgium Duration: 15 Sept 2011 → 16 Sept 2011 https://www.cosic.esat.kuleuven.be/europki2011/ (Link to Workshop website) |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 7163 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Workshop
Workshop | 8th European Workshop on Public Key Infrastructures, Services, and Applications |
---|---|
Abbreviated title | EuroPKI 2011 |
Country/Territory | Belgium |
City | Leuven |
Period | 15/09/11 → 16/09/11 |
Internet address |
|
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science