Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking
Data(s) |
2012
|
---|---|
Resumo |
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols. |
Formato |
application/pdf |
Identificador | |
Relação |
http://eprints.qut.edu.au/49883/1/bare_conf.pdf DOI:10.1007/978-3-642-31448-3_33 Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW. |
Direitos |
Copyright 2012 [please consult the authors] |
Fonte |
Information Security Institute; Science & Engineering Faculty |
Palavras-Chave | #080000 INFORMATION AND COMPUTING SCIENCES #080303 Computer System Security #RFID |
Tipo |
Conference Paper |