On two RFID privacy notions and their relations

Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID p...

Full description

Saved in:
Bibliographic Details
Main Authors: LI, Yingjiu, DENG, Robert H., LAI, Junzuo, MA, Changshe
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2011
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1472
https://ink.library.smu.edu.sg/context/sis_research/article/2471/viewcontent/Two_RFID_Privacy_2011_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2471
record_format dspace
spelling sg-smu-ink.sis_research-24712019-03-11T03:53:38Z On two RFID privacy notions and their relations LI, Yingjiu DENG, Robert H. LAI, Junzuo MA, Changshe Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp*-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy model. It is proven that ind-privacy is weaker than unp*-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp-privacy is determined. It is shown that if an RFID system is unp*-private, then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with unp*-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag’s computational power for enforcing RFID system privacy. Finally, a new RFID mutual authentication protocol is proposed to satisfy the minimal requirement. 2011-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1472 info:doi/10.1145/2043628.2043631 https://ink.library.smu.edu.sg/context/sis_research/article/2471/viewcontent/Two_RFID_Privacy_2011_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University RFID privacy pseudorandom function Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic RFID
privacy
pseudorandom function
Information Security
spellingShingle RFID
privacy
pseudorandom function
Information Security
LI, Yingjiu
DENG, Robert H.
LAI, Junzuo
MA, Changshe
On two RFID privacy notions and their relations
description Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp*-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy model. It is proven that ind-privacy is weaker than unp*-privacy. Moreover, the minimal (necessary and sufficient) condition on RFID tags to achieve unp-privacy is determined. It is shown that if an RFID system is unp*-private, then the computational power of an RFID tag can be used to construct a pseudorandom function family provided that the RFID system is complete and sound. On the other hand, if each tag is able to compute a pseudorandom function, then the tags can be used to construct an RFID system with unp*-privacy. In this sense, a pseudorandom function family is the minimal requirement on an RFID tag’s computational power for enforcing RFID system privacy. Finally, a new RFID mutual authentication protocol is proposed to satisfy the minimal requirement.
format text
author LI, Yingjiu
DENG, Robert H.
LAI, Junzuo
MA, Changshe
author_facet LI, Yingjiu
DENG, Robert H.
LAI, Junzuo
MA, Changshe
author_sort LI, Yingjiu
title On two RFID privacy notions and their relations
title_short On two RFID privacy notions and their relations
title_full On two RFID privacy notions and their relations
title_fullStr On two RFID privacy notions and their relations
title_full_unstemmed On two RFID privacy notions and their relations
title_sort on two rfid privacy notions and their relations
publisher Institutional Knowledge at Singapore Management University
publishDate 2011
url https://ink.library.smu.edu.sg/sis_research/1472
https://ink.library.smu.edu.sg/context/sis_research/article/2471/viewcontent/Two_RFID_Privacy_2011_afv.pdf
_version_ 1770571170903490560