Mobility

RFID Key Establishment Against Active Adversaries

Free registration required

Executive Summary

Wireless communication is the source of many opportunities and challenges, one of which being its confidentiality. A convenient way to achieve confidentiality is to use cryptography, which requires for the communicating entities to detain a cryptographic key beforehand. The authors focus on particular wireless devices, called RFID (for Radio-Frequency IDentification tags). These are electronic tags made of an integrated circuit equipped with an antenna. The amount of computation possible in RFID tags is somewhat limited, due to constraints on cost, size and power consumption of such devices.

  • Format: PDF
  • Size: 232.25 KB