Abstract
We discuss insider attacks on RFID protocols with a focus on RFID tag privacy and demonstrate such attacks on published RFID protocols. In particular, we show attacks on a challenge-response protocol with IND-CCA1 encryption and on the randomized hashed GPS protocol. We then show that IND-CCA2 encryption can be used to prevent insider attacks and present a protocol secure against insider attacks. The protocol is based solely on elliptic-curve operations.
| Original language | English |
|---|---|
| Title of host publication | Public Key Infrastructures, Services, and Applications |
| Subtitle of host publication | 8th European Workshop, EuroPKI 2011 Leuven, Belgium, September 15-16, 2011 Revised Selected Papers |
| Editors | Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul |
| Place of Publication | Berlin |
| Publisher | Springer Verlag |
| Pages | 91-105 |
| Number of pages | 15 |
| ISBN (Electronic) | 9783642298042 |
| ISBN (Print) | 9783642298035 |
| DOIs | |
| Publication status | Published - 2012 |
| Event | 8th European Workshop on Public Key Infrastructures, Services, and Applications - K.U.Leuven Nieuwe Valk, Leuven, Belgium Duration: 15 Sept 2011 → 16 Sept 2011 https://www.cosic.esat.kuleuven.be/europki2011/ (Link to Workshop website) |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Publisher | Springer |
| Volume | 7163 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Workshop
| Workshop | 8th European Workshop on Public Key Infrastructures, Services, and Applications |
|---|---|
| Abbreviated title | EuroPKI 2011 |
| Country/Territory | Belgium |
| City | Leuven |
| Period | 15/09/11 → 16/09/11 |
| Internet address |
|
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'Insider Attacks and Privacy of RFID Protocols'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver