Abstract
Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, and 2. RFID-based Payment. In multi-tag security, multiple tags try to jointly compute an information while using the reader either as the focal point of all communication or as a relay for tag-to-tag communication. In this scenario, the security of the computation has to be guaranteed while also privacy of individual tags must be protected. In a payment scenario, tags are used as electronic wallets similar to the notions of traditional electronic cash. Payment must be secured against malicious spending, and the privacy of tags and their payments must be protected.
This work has been supported by the RFIDAP project, grant reference ANR-07-SESU-009, funded by Agence Nationale de La Recherche as part of the SESUR 2007 call.
Chapter PDF
Similar content being viewed by others
Keywords
- Blind Signature
- Homomorphic Encryption
- Electronic Cash
- Annual International Cryptology
- Secure Data Aggregation
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ateniese, G., Blanton, M., Kirsch, J.: Secret handshakes with dynamic and fuzzy matching. In: Network and Distributed System Security Symposium, pp. 159–177 (2007)
Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in rfid systems. In: Proceedings of Selected Areas in Cryptography, Kingston, Canada, pp. 291–306 (2005) ISBN 978-3-540-33108-7
Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.C.: Secret handshakes from pairing-based key agreements. In: IEEE Symposium on Security and Privacy, pp. 180–196 (2003)
Brands, S.: Untraceable off-line cash in wallets with observers. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, USA, pp. 302–318 (1993) ISBN 3-540-57766-1
Castellucia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: 2nd Annual International Conference on Mobile and Ubiquitous Systems, Mobiquitous (2005)
Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, USA, pp. 199–203 (1982)
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, USA, pp. 319–327 (1988) ISBN 3-540-97196-3
Dimitrou, T.: Rfiddot: Rfid delegation and ownership transfer made simple. In: Proceedings of International Conference on Security and privacy in Communication Networks, Istanbul, Turkey (2008) ISBN 978-1-60558-241-2
Girao, J., Westhoff, D., Schneider, M.: Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: IEEE ICC 2005 (2005)
Juels, A., Weis, S.: Defining strong privacy for rfid. In: PerCom Workshops, White Plains, USA, pp. 342–347 (2007) ISBN 978-0-7695-2788-8
Önen, M., Molva, R.: Secure data aggregation with multiple encryption. In: Langendoen, K.G., Voigt, T. (eds.) EWSN 2007. LNCS, vol. 4373, pp. 117–132. Springer, Heidelberg (2007)
Pietro, R.D., Molva, R.: Information confinement, privacy, and security in rfid systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 187–202. Springer, Heidelberg (2007)
Sorniotti, A., Molva, R.: A provably secure secret handshake with dynamic controlled matching. In: IFIP SEC 2009, 24th International Information Security Conference, Pafos, Cyprus, May 18-20 (2009)
Transport for London: Oyster online (2009), https://oyster.tfl.gov.uk/oyster/entry.do
Tsudik, G.: Ya-trap: yet another trivial rfid authentication protocol. In: Proceedings of International Conference on Pervasive Computing and Communications Workshops, Pisa, Italy (2006) ISBN 0-7695-2520-2
van Tilborg, H.C.A. (ed.): Encyclopedia of Cryptography and Security. Springer, Heidelberg (2005)
Vaudenay, S.: On privacy models for rfid. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Security in Pervasive Computing, Boppard, Germany, pp. 201–212 (2003) ISBN 3-540-20887-9
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Blass, EO., Molva, R. (2009). New Directions in RFID Security. In: Camenisch, J., Kesdogan, D. (eds) iNetSec 2009 – Open Research Problems in Network Security. 2009. IFIP Advances in Information and Communication Technology, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05437-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-05437-2_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05436-5
Online ISBN: 978-3-642-05437-2
eBook Packages: Computer ScienceComputer Science (R0)