On two RFID privacy notions and their relations
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID p...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1472 https://ink.library.smu.edu.sg/context/sis_research/article/2471/viewcontent/Two_RFID_Privacy_2011_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2471 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-24712019-03-11T03:53:38Z On two RFID privacy notions and their relations LI, Yingjiu DENG, Robert H. LAI, Junzuo MA, Changshe Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp*-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy model. It is proven that ind-privacy is weaker than unp*-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp-privacy is determined. It is shown that if an RFID system is unp*-private, then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with unp*-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag’s computational power for enforcing RFID system privacy. Finally, a new RFID mutual authentication protocol is proposed to satisfy the minimal requirement. 2011-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1472 info:doi/10.1145/2043628.2043631 https://ink.library.smu.edu.sg/context/sis_research/article/2471/viewcontent/Two_RFID_Privacy_2011_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University RFID privacy pseudorandom function Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
RFID privacy pseudorandom function Information Security |
spellingShingle |
RFID privacy pseudorandom function Information Security LI, Yingjiu DENG, Robert H. LAI, Junzuo MA, Changshe On two RFID privacy notions and their relations |
description |
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp*-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy model. It is proven that ind-privacy is weaker than unp*-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp-privacy is determined. It is shown that if an RFID system is unp*-private, then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with unp*-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag’s computational power for enforcing RFID system privacy. Finally, a new RFID mutual authentication protocol is proposed to satisfy the minimal requirement. |
format |
text |
author |
LI, Yingjiu DENG, Robert H. LAI, Junzuo MA, Changshe |
author_facet |
LI, Yingjiu DENG, Robert H. LAI, Junzuo MA, Changshe |
author_sort |
LI, Yingjiu |
title |
On two RFID privacy notions and their relations |
title_short |
On two RFID privacy notions and their relations |
title_full |
On two RFID privacy notions and their relations |
title_fullStr |
On two RFID privacy notions and their relations |
title_full_unstemmed |
On two RFID privacy notions and their relations |
title_sort |
on two rfid privacy notions and their relations |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/1472 https://ink.library.smu.edu.sg/context/sis_research/article/2471/viewcontent/Two_RFID_Privacy_2011_afv.pdf |
_version_ |
1770571170903490560 |