Insider attacks and privacy of RFID protocols

Ton van Deursen*, Saša Radomirović

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

We discuss insider attacks on RFID protocols with a focus on RFID tag privacy and demonstrate such attacks on published RFID protocols. In particular, we show attacks on a challenge-response protocol with IND-CCA1 encryption and on the randomized hashed GPS protocol. We then show that IND-CCA2 encryption can be used to prevent insider attacks and present a protocol secure against insider attacks. The protocol is based solely on elliptic-curve operations.

Original languageEnglish
Title of host publicationPublic Key Infrastructures, Services, and Applications. EuroPKI 2011
PublisherSpringer
Pages91-105
Number of pages15
ISBN (Electronic)9783642298042
ISBN (Print)9783642298035
DOIs
Publication statusPublished - 2012
Event8th European Workshop on Public Key Infrastructures, Services, and Applications 2011 - Leuven, Belgium
Duration: 15 Sept 201116 Sept 2011

Publication series

NameLecture Notes in Computer Science
Volume7163
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th European Workshop on Public Key Infrastructures, Services, and Applications 2011
Abbreviated titleEuroPKI 2011
Country/TerritoryBelgium
CityLeuven
Period15/09/1116/09/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Insider attacks and privacy of RFID protocols'. Together they form a unique fingerprint.

Cite this