Loading...

Analysis Of Privacy Challenges In RFID Authentication Protocols

Sohrabi-Bonab, Zahra | 2014

380 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 45452 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza
  7. Abstract:
  8. Radio Frequency IDentification (RFID) is an increasingly important area in automatic identification. Low cost RFID tags (labels) are considered as the next generation of barcodes and their purpose is to compensate for shortcomings in computer recognition of objects using cameras. Supply chain management, access control, animal identification,e-passports along with the possibility of having e-health, e-agriculture and smart homes are few examples of RFID application developments. Despite its low cost, ubiquity, and widespread usage, RFID tags suffer from several major drawbacks, particularly information leakage and traceability. In RFID authentication protocols, both information leakage and traceability concerns are treated as privacy risks. The ratio of iterature investigations in security and privacy emphasizes that designing a privacy-friendly authentication protocol is still a challenging task and this feature is essential in RFID applications.In this thesis we seek to address the privacy issues in the RFID authentication protocols. There are lots of methods to analyze RFID authentication protocols based on both ad hoc and formal methods. Since formal methods and privacy models gives a better solution to explore the potential vulnerabilities of RFID protocols, we introduce various existing privacy models and compare their performances. There are two general frameworks to analyses the privacy of the RFID protocols. The indistinguishability-based models and the simulations-based models. Following the indistinguishability-based models, we inspect the three new-found RFID authentication protocols based on quadratic residue property via one of the well-organized formal RFID privacy models. We formally prove that modular squaring is a suitable technique to guarantee RFID authentication protocols against backward traceability. Then we provide an improved simulations-based privacy model for RFID applications. Based on our privacy framework, we analyize two other recent authentication protocols. We utilize the improved privacy model to prove that these scheme only supports the lowest privacy level and they are traceable as well. Finally we propose a new private RFID authentication protocol using the new model to prove its privacy properties
  9. Keywords:
  10. Authentication Protocols ; Confidentiality ; Tracking ; Formal Methods ; Radio Frequency Identification (RFID) ; Privacy Models

 Digital Object List

 Bookmark

No TOC