Insider Attacks and Privacy of RFID Protocols

Ton Van Deursen, Saša Radomirović

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

We discuss insider attacks on RFID protocols with a focus on RFID tag privacy and demonstrate such attacks on published RFID protocols. In particular, we show attacks on a challenge-response protocol with IND-CCA1 encryption and on the randomized hashed GPS protocol. We then show that IND-CCA2 encryption can be used to prevent insider attacks and present a protocol secure against insider attacks. The protocol is based solely on elliptic-curve operations.

Original languageEnglish
Title of host publicationPublic Key Infrastructures, Services, and Applications
Subtitle of host publication8th European Workshop, EuroPKI 2011 Leuven, Belgium, September 15-16, 2011 Revised Selected Papers
EditorsSvetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul
Place of PublicationBerlin
PublisherSpringer Verlag
Pages91-105
Number of pages15
ISBN (Electronic)9783642298042
ISBN (Print)9783642298035
DOIs
Publication statusPublished - 2012
Event8th European Workshop on Public Key Infrastructures, Services, and Applications - K.U.Leuven Nieuwe Valk, Leuven, Belgium
Duration: 15 Sept 201116 Sept 2011
https://www.cosic.esat.kuleuven.be/europki2011/ (Link to Workshop website)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume7163
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop8th European Workshop on Public Key Infrastructures, Services, and Applications
Abbreviated titleEuroPKI 2011
Country/TerritoryBelgium
CityLeuven
Period15/09/1116/09/11
Internet address

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Insider Attacks and Privacy of RFID Protocols'. Together they form a unique fingerprint.

Cite this