HJM Tree for Security Analyses of Pass RFID Systems

Research output: A Conference proceeding or a Chapter in BookChapterpeer-review

1 Citation (Scopus)

Abstract

Radio frequency identification (RFID) technology is not fundamentally new and concerns a whole range of applications. The first RFID application may have been the Royal British Air Force’s “Identify Friend or Foe” system, which was used during the Second World War to identify friendly aircraft. RFID can be applied to a variety of tasks, structures, work systems, and contexts along the value chain, including business-to-business (B-2-B) logistics, internal operations, business-toconsumer (B-2-C) marketing, and after-sales service applications [1–6]. However, the boom that RFID technology enjoys today is basically due to the standardization [7] and development of low cost devices.

Like every wireless device, RFID systems bring with them security and privacy issues to all those people who have been working in this area. Security issues involve classic attacks, namely denial of service, impersonation of tags, or channel eavesdropping. These attacks are rendered more practicable because of the tags’ lack of computational and storage capacity. There are many papers investigating these issues in various ways [7, 8, 10–12, 14]. Today’s challenge is to find protocols (or deployments) which allow authorized parties to identify the tags without an adversary being able to track them, thus getting to the root of the privacy problem [8, 13]. It is well known that the reason not to use well known authentication protocols is that such protocols do not preserve the privacy of the provider. Asymmetric cryptography could easily solve this problem, but it is too heavy to be implemented within a tag.
Original languageEnglish
Title of host publicationAdvances in Communication Systes and Electrial Engineering
EditorsXu Huang, Yuh-Shyan Chen, Sio-long Ao
Place of PublicationUnited States
PublisherSpringer
Pages127-138
Number of pages12
Volume4
Edition1
ISBN (Electronic)9780387749389
ISBN (Print)9780387749372
DOIs
Publication statusPublished - 2008

Fingerprint

Dive into the research topics of 'HJM Tree for Security Analyses of Pass RFID Systems'. Together they form a unique fingerprint.

Cite this