Extending an RFID Security and Privacy Model by Considering Forward Untraceability View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2011

AUTHORS

Mete Akgün , Mehmet Ufuk Çaǧlayan

ABSTRACT

There are numerous works on the privacy and the security problems for RFID systems. However, many of them have failed due to the lack of formal security proof. In the literature, there are a few formal models that consider forward untraceability. In ASIACRYPT 2007, Vaudenay presented an new security and privacy model for RFID that combines early models to more understandable one. In this paper, we revisit Vaudenay’s model and modify it by considering the notion of forward untraceability. Our modification considers all message flows between RFID reader and tags before and after compromising secrets of tag. We analyze some RFID schemes claiming to provide forward untraceability and resistance to server impersonation. For each scheme, we exhibit attacks in which a strong adversary can trace the future interactions of the tag and impersonate the valid server to the tag. Further, we show that a previously proposed attack claiming to violate forward untraceability of an existing RFID scheme does not violate forward untraceability. More... »

PAGES

239-254

Book

TITLE

Security and Trust Management

ISBN

978-3-642-22443-0
978-3-642-22444-7

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16

DOI

http://dx.doi.org/10.1007/978-3-642-22444-7_16

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1035492413


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey", 
          "id": "http://www.grid.ac/institutes/grid.11220.30", 
          "name": [
            "T\u00fcbitak UEKAE, 41470, Kocaeli, Turkey", 
            "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Akg\u00fcn", 
        "givenName": "Mete", 
        "id": "sg:person.0635104226.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0635104226.42"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey", 
          "id": "http://www.grid.ac/institutes/grid.11220.30", 
          "name": [
            "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey"
          ], 
          "type": "Organization"
        }, 
        "familyName": "\u00c7a\u01e7layan", 
        "givenName": "Mehmet Ufuk", 
        "id": "sg:person.015011544465.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015011544465.26"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2011", 
    "datePublishedReg": "2011-01-01", 
    "description": "There are numerous works on the privacy and the security problems for RFID systems. However, many of them have failed due to the lack of formal security proof. In the literature, there are a few formal models that consider forward untraceability. In ASIACRYPT 2007, Vaudenay presented an new security and privacy model for RFID that combines early models to more understandable one. In this paper, we revisit Vaudenay\u2019s model and modify it by considering the notion of forward untraceability. Our modification considers all message flows between RFID reader and tags before and after compromising secrets of tag. We analyze some RFID schemes claiming to provide forward untraceability and resistance to server impersonation. For each scheme, we exhibit attacks in which a strong adversary can trace the future interactions of the tag and impersonate the valid server to the tag. Further, we show that a previously proposed attack claiming to violate forward untraceability of an existing RFID scheme does not violate forward untraceability.", 
    "editor": [
      {
        "familyName": "Cuellar", 
        "givenName": "Jorge", 
        "type": "Person"
      }, 
      {
        "familyName": "Lopez", 
        "givenName": "Javier", 
        "type": "Person"
      }, 
      {
        "familyName": "Barthe", 
        "givenName": "Gilles", 
        "type": "Person"
      }, 
      {
        "familyName": "Pretschner", 
        "givenName": "Alexander", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-22444-7_16", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-22443-0", 
        "978-3-642-22444-7"
      ], 
      "name": "Security and Trust Management", 
      "type": "Book"
    }, 
    "keywords": [
      "forward untraceability", 
      "privacy model", 
      "RFID scheme", 
      "formal security proof", 
      "RFID security", 
      "Vaudenay\u2019s model", 
      "server impersonation", 
      "security problems", 
      "security proof", 
      "untraceability", 
      "strong adversary", 
      "formal model", 
      "ASIACRYPT 2007", 
      "new security", 
      "RFID system", 
      "RFID reader", 
      "security", 
      "understandable ones", 
      "scheme", 
      "attacks", 
      "future interactions", 
      "tags", 
      "numerous works", 
      "server", 
      "privacy", 
      "RFID", 
      "impersonation", 
      "adversary", 
      "Vaudenay", 
      "messages", 
      "secrets", 
      "model", 
      "proof", 
      "system", 
      "work", 
      "notion", 
      "earlier models", 
      "readers", 
      "one", 
      "lack", 
      "literature", 
      "interaction", 
      "modification", 
      "resistance", 
      "paper", 
      "problem", 
      "secrets of tag", 
      "valid server"
    ], 
    "name": "Extending an RFID Security and Privacy Model by Considering Forward Untraceability", 
    "pagination": "239-254", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1035492413"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-22444-7_16"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-22444-7_16", 
      "https://app.dimensions.ai/details/publication/pub.1035492413"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:20", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_345.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-22444-7_16"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      23 PREDICATES      74 URIs      67 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-22444-7_16 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nf0444fdc8b594f90858fae5ce4d33a55
4 schema:datePublished 2011
5 schema:datePublishedReg 2011-01-01
6 schema:description There are numerous works on the privacy and the security problems for RFID systems. However, many of them have failed due to the lack of formal security proof. In the literature, there are a few formal models that consider forward untraceability. In ASIACRYPT 2007, Vaudenay presented an new security and privacy model for RFID that combines early models to more understandable one. In this paper, we revisit Vaudenay’s model and modify it by considering the notion of forward untraceability. Our modification considers all message flows between RFID reader and tags before and after compromising secrets of tag. We analyze some RFID schemes claiming to provide forward untraceability and resistance to server impersonation. For each scheme, we exhibit attacks in which a strong adversary can trace the future interactions of the tag and impersonate the valid server to the tag. Further, we show that a previously proposed attack claiming to violate forward untraceability of an existing RFID scheme does not violate forward untraceability.
7 schema:editor N0d667c85a73b4c5e9928aa4db3c373f9
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nb5018e0b52924c628802dc3167d23ce3
12 schema:keywords ASIACRYPT 2007
13 RFID
14 RFID reader
15 RFID scheme
16 RFID security
17 RFID system
18 Vaudenay
19 Vaudenay’s model
20 adversary
21 attacks
22 earlier models
23 formal model
24 formal security proof
25 forward untraceability
26 future interactions
27 impersonation
28 interaction
29 lack
30 literature
31 messages
32 model
33 modification
34 new security
35 notion
36 numerous works
37 one
38 paper
39 privacy
40 privacy model
41 problem
42 proof
43 readers
44 resistance
45 scheme
46 secrets
47 secrets of tag
48 security
49 security problems
50 security proof
51 server
52 server impersonation
53 strong adversary
54 system
55 tags
56 understandable ones
57 untraceability
58 valid server
59 work
60 schema:name Extending an RFID Security and Privacy Model by Considering Forward Untraceability
61 schema:pagination 239-254
62 schema:productId N2383e660f8854e0fac6d00e4322a9227
63 N8efb9e854e8c4f368b9dd1346fd05cae
64 schema:publisher N5d8abc121b934347a0cef32c0262ffb5
65 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035492413
66 https://doi.org/10.1007/978-3-642-22444-7_16
67 schema:sdDatePublished 2022-01-01T19:20
68 schema:sdLicense https://scigraph.springernature.com/explorer/license/
69 schema:sdPublisher N7ce4464c6e754549832c16c8f405457e
70 schema:url https://doi.org/10.1007/978-3-642-22444-7_16
71 sgo:license sg:explorer/license/
72 sgo:sdDataset chapters
73 rdf:type schema:Chapter
74 N0d667c85a73b4c5e9928aa4db3c373f9 rdf:first N54796e93224041709d10e2a4772006fd
75 rdf:rest Nca6156106f20484c8a21d69b41190914
76 N163e62173f4840a3b6f51354271053ca schema:familyName Lopez
77 schema:givenName Javier
78 rdf:type schema:Person
79 N2383e660f8854e0fac6d00e4322a9227 schema:name doi
80 schema:value 10.1007/978-3-642-22444-7_16
81 rdf:type schema:PropertyValue
82 N54796e93224041709d10e2a4772006fd schema:familyName Cuellar
83 schema:givenName Jorge
84 rdf:type schema:Person
85 N54c0b166f5564583b4d3139775141f3e rdf:first N780d415434264aaeac3f3b1939981cbb
86 rdf:rest N65f5d5442c07434a9708716845da0416
87 N5d8abc121b934347a0cef32c0262ffb5 schema:name Springer Nature
88 rdf:type schema:Organisation
89 N65f5d5442c07434a9708716845da0416 rdf:first Nc08ddb5399bf44e5ae2f64390475c3eb
90 rdf:rest rdf:nil
91 N780d415434264aaeac3f3b1939981cbb schema:familyName Barthe
92 schema:givenName Gilles
93 rdf:type schema:Person
94 N7ce4464c6e754549832c16c8f405457e schema:name Springer Nature - SN SciGraph project
95 rdf:type schema:Organization
96 N894095c7a55949488a60e2a905bb07ba rdf:first sg:person.015011544465.26
97 rdf:rest rdf:nil
98 N8efb9e854e8c4f368b9dd1346fd05cae schema:name dimensions_id
99 schema:value pub.1035492413
100 rdf:type schema:PropertyValue
101 Nb5018e0b52924c628802dc3167d23ce3 schema:isbn 978-3-642-22443-0
102 978-3-642-22444-7
103 schema:name Security and Trust Management
104 rdf:type schema:Book
105 Nc08ddb5399bf44e5ae2f64390475c3eb schema:familyName Pretschner
106 schema:givenName Alexander
107 rdf:type schema:Person
108 Nca6156106f20484c8a21d69b41190914 rdf:first N163e62173f4840a3b6f51354271053ca
109 rdf:rest N54c0b166f5564583b4d3139775141f3e
110 Nf0444fdc8b594f90858fae5ce4d33a55 rdf:first sg:person.0635104226.42
111 rdf:rest N894095c7a55949488a60e2a905bb07ba
112 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
113 schema:name Information and Computing Sciences
114 rdf:type schema:DefinedTerm
115 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
116 schema:name Data Format
117 rdf:type schema:DefinedTerm
118 sg:person.015011544465.26 schema:affiliation grid-institutes:grid.11220.30
119 schema:familyName Çaǧlayan
120 schema:givenName Mehmet Ufuk
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015011544465.26
122 rdf:type schema:Person
123 sg:person.0635104226.42 schema:affiliation grid-institutes:grid.11220.30
124 schema:familyName Akgün
125 schema:givenName Mete
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0635104226.42
127 rdf:type schema:Person
128 grid-institutes:grid.11220.30 schema:alternateName Computer Engineering Department, Boǧaziçi University, İstanbul, Turkey
129 schema:name Computer Engineering Department, Boǧaziçi University, İstanbul, Turkey
130 Tübitak UEKAE, 41470, Kocaeli, Turkey
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...