Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking

  • Kaleb Lee
  • Colin Boyd
  • Juan Manule González-Nieto
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7372)


The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor at the top layer. Indefinitely increasing the branching factor, however, is not a practical option. This paper proposes an alternate tree-walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Avoine, G., Buttyán, L., Holczer, T., Vajda, I.: Group-based private authentication. In: IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing – TSPUC, Helsinki, Finland, pp. 1–6. IEEE Computer Society Press (June 2007)Google Scholar
  2. 2.
    Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291–306. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Buttyán, L., Holczer, T., Vajda, I.: Optimal Key-Trees for Tree-Based Private Authentication. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 332–350. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Huang, X.: Quantifying information leakage in RFID systems. In: 10th International Conference on Advanced Communication Technology, vol. 1, pp. 84–89 (February 2008)Google Scholar
  5. 5.
    Lee, K., Nieto, J.G., Boyd, C.: Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking (2012),
  6. 6.
    Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: CCS 2004: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM, New York (2004)CrossRefGoogle Scholar
  7. 7.
    Nohl, K., Evans, D.: Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 228–237. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Kaleb Lee
    • 1
  • Colin Boyd
    • 1
  • Juan Manule González-Nieto
    • 1
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations