Mobility

Privacy-Preserving RFID Systems: Model and Constructions

Free registration required

Executive Summary

In this paper, the authors study systems where a reader wants to authenticate and identify legitimate RFID tags. Such system needs thus to be correct (Legitimate tags are accepted) and sound (Fake tags are rejected). Moreover, an RFID tag in a privacy-preserving system should be anonymous and untraceable, except for the legitimate reader. The authors here present the first security model for RFID authentication/identification privacy preserving systems which is at the same time complete and easy to use.

  • Format: PDF
  • Size: 384.8 KB