210 likes | 340 Views
This paper presents a comprehensive model for off-line RFID systems that addresses the critical issue of reader corruption. It discusses current RFID privacy models and introduces innovative forward privacy and self-stabilizing backward privacy protocols. By analyzing the complexities of real-world systems, it emphasizes the importance of secure connections and provides insights into achieving privacy even in the presence of adversaries. Key conclusions highlight the resilience of these protocols and their reliance on hash functions to improve synchronization and overall system security.
E N D
Modelling Privacy for Off-line RFID Systems FlavioGarcia Radboud University Nijmegen together with Peter van Rossum RFIDSec 2009
Outline • Current RFID privacy models • A new model for off-line RFID systems that considers reader corruption • Forward and self-stabilizing backwards privacy • Protocols • Conclusions
Current RFID Models Permanent secure connexion Fwd-Privacy • Juels and Weis (2006) • Vaudenay (2007) • Avoine (2005)
Fwd-Privacy Time Safe Un-Safe
Many real systems are more complex What kind of security can still be guaranteed? Periodic connexion More information on the readers
An adversary is a PPTA with access to the set of oracles O: • CreateReader(R) • CreateTag(T) • Launch(R) • Send(m,A) • Result() • CorruptTag(T) • Sync() O+ = O {DestroyReader(R)}
Fwd and Bwd-Privacy Safe Un-Safe Safe Unachievable! (Unless extra assumptions are made)
Forward and Self-stabilizing Backwards Private Protocol (idea) new day! BO K ← h(k) K ← h(k) K ← h(k’+1) K’ ← h(k’) K to `talk’ with the reader K’ to `talk’ with the BO MAC using k’
Conclusions • model for (off-line) RFID systems in the presence of reader corruption • forward and self-stabilizing backwards private protocols that uses only hash functions. • De-sync resilience