Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking


Autoria(s): Lee, Kaleb; Nieto, Juan Gonzalez; Boyd, Colin
Data(s)

2012

Resumo

The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/49883/

Relação

http://eprints.qut.edu.au/49883/1/bare_conf.pdf

DOI:10.1007/978-3-642-31448-3_33

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW.

Direitos

Copyright 2012 [please consult the authors]

Fonte

Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080000 INFORMATION AND COMPUTING SCIENCES #080303 Computer System Security #RFID
Tipo

Conference Paper