A survey on privacy frameworks for RFID authentication
Due to rapid growth of RFID system applications, the security and privacy problems become more and more important to guarantee the validity of RFID systems. Without introducing proper privacy protection mechanisms, widespread deployment of RFID could raise privacy concerns to both companies and indi...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2012
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1480 https://ink.library.smu.edu.sg/context/sis_research/article/2479/viewcontent/A_Survey_on_Privacy_Frameworks_for_RFID_Authentication.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2479 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-24792018-01-26T07:37:30Z A survey on privacy frameworks for RFID authentication SU, Chunhua LI, Yingjiu ZHAO, Yunlei DENG, Robert H. ZHAO, Yiming ZHOU, Jianying Due to rapid growth of RFID system applications, the security and privacy problems become more and more important to guarantee the validity of RFID systems. Without introducing proper privacy protection mechanisms, widespread deployment of RFID could raise privacy concerns to both companies and individuals. As a fundamental issue for the design and analysis of secure RFID systems, some formal RFID privacy frameworks were proposed in recent years to give the principles for evaluating the security and privacy in RFID system. However, readers can be confused with so many proposed frameworks. In this paper, we make a comparative and survey study on the proposed RFID privacy frameworks. We mainly divide the existing models into three categories, the four-oracle framework, eight-oracle framework and Universal Composability framework. We give a brief review on the existing models and describe their abilities to model the adversarial behavior in RFID systems. We then analyze relations among those existing RFID privacy models and make some comparisons among their properties. 2012-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1480 info:doi/10.1587/transinf.E95.D.2 https://ink.library.smu.edu.sg/context/sis_research/article/2479/viewcontent/A_Survey_on_Privacy_Frameworks_for_RFID_Authentication.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University RFID security authentication protocol privacy Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
RFID security authentication protocol privacy Information Security |
spellingShingle |
RFID security authentication protocol privacy Information Security SU, Chunhua LI, Yingjiu ZHAO, Yunlei DENG, Robert H. ZHAO, Yiming ZHOU, Jianying A survey on privacy frameworks for RFID authentication |
description |
Due to rapid growth of RFID system applications, the security and privacy problems become more and more important to guarantee the validity of RFID systems. Without introducing proper privacy protection mechanisms, widespread deployment of RFID could raise privacy concerns to both companies and individuals. As a fundamental issue for the design and analysis of secure RFID systems, some formal RFID privacy frameworks were proposed in recent years to give the principles for evaluating the security and privacy in RFID system. However, readers can be confused with so many proposed frameworks. In this paper, we make a comparative and survey study on the proposed RFID privacy frameworks. We mainly divide the existing models into three categories, the four-oracle framework, eight-oracle framework and Universal Composability framework. We give a brief review on the existing models and describe their abilities to model the adversarial behavior in RFID systems. We then analyze relations among those existing RFID privacy models and make some comparisons among their properties. |
format |
text |
author |
SU, Chunhua LI, Yingjiu ZHAO, Yunlei DENG, Robert H. ZHAO, Yiming ZHOU, Jianying |
author_facet |
SU, Chunhua LI, Yingjiu ZHAO, Yunlei DENG, Robert H. ZHAO, Yiming ZHOU, Jianying |
author_sort |
SU, Chunhua |
title |
A survey on privacy frameworks for RFID authentication |
title_short |
A survey on privacy frameworks for RFID authentication |
title_full |
A survey on privacy frameworks for RFID authentication |
title_fullStr |
A survey on privacy frameworks for RFID authentication |
title_full_unstemmed |
A survey on privacy frameworks for RFID authentication |
title_sort |
survey on privacy frameworks for rfid authentication |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2012 |
url |
https://ink.library.smu.edu.sg/sis_research/1480 https://ink.library.smu.edu.sg/context/sis_research/article/2479/viewcontent/A_Survey_on_Privacy_Frameworks_for_RFID_Authentication.pdf |
_version_ |
1770571200096894976 |