Practical Schemes for Privacy & Security Enhanced RFID

Free registration required

Executive Summary

Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical. Some use hash functions instead of the more hardware efficient symmetric encryption schemes as a cryptographic primitive. Others incur a rather large time penalty at the reader side, because the reader has to perform a key search over large tag key space. Moreover, they do not allow for dynamic, fine-grained access control to the tag that caters for more complex usage scenarios. In this paper the authors investigate such scenarios, and propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags.

  • Format: PDF
  • Size: 305.35 KB