Extending an RFID Security and Privacy Model by Considering Forward Untraceability View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2011

AUTHORS

Mete Akgün , Mehmet Ufuk Çaǧlayan

ABSTRACT

There are numerous works on the privacy and the security problems for RFID systems. However, many of them have failed due to the lack of formal security proof. In the literature, there are a few formal models that consider forward untraceability. In ASIACRYPT 2007, Vaudenay presented an new security and privacy model for RFID that combines early models to more understandable one. In this paper, we revisit Vaudenay’s model and modify it by considering the notion of forward untraceability. Our modification considers all message flows between RFID reader and tags before and after compromising secrets of tag. We analyze some RFID schemes claiming to provide forward untraceability and resistance to server impersonation. For each scheme, we exhibit attacks in which a strong adversary can trace the future interactions of the tag and impersonate the valid server to the tag. Further, we show that a previously proposed attack claiming to violate forward untraceability of an existing RFID scheme does not violate forward untraceability. More... »

PAGES

239-254

Book

TITLE

Security and Trust Management

ISBN

978-3-642-22443-0
978-3-642-22444-7

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16

DOI

http://dx.doi.org/10.1007/978-3-642-22444-7_16

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1035492413


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey", 
          "id": "http://www.grid.ac/institutes/grid.11220.30", 
          "name": [
            "T\u00fcbitak UEKAE, 41470, Kocaeli, Turkey", 
            "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Akg\u00fcn", 
        "givenName": "Mete", 
        "id": "sg:person.0635104226.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0635104226.42"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey", 
          "id": "http://www.grid.ac/institutes/grid.11220.30", 
          "name": [
            "Computer Engineering Department, Bo\u01e7azi\u00e7i University, \u0130stanbul, Turkey"
          ], 
          "type": "Organization"
        }, 
        "familyName": "\u00c7a\u01e7layan", 
        "givenName": "Mehmet Ufuk", 
        "id": "sg:person.015011544465.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015011544465.26"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2011", 
    "datePublishedReg": "2011-01-01", 
    "description": "There are numerous works on the privacy and the security problems for RFID systems. However, many of them have failed due to the lack of formal security proof. In the literature, there are a few formal models that consider forward untraceability. In ASIACRYPT 2007, Vaudenay presented an new security and privacy model for RFID that combines early models to more understandable one. In this paper, we revisit Vaudenay\u2019s model and modify it by considering the notion of forward untraceability. Our modification considers all message flows between RFID reader and tags before and after compromising secrets of tag. We analyze some RFID schemes claiming to provide forward untraceability and resistance to server impersonation. For each scheme, we exhibit attacks in which a strong adversary can trace the future interactions of the tag and impersonate the valid server to the tag. Further, we show that a previously proposed attack claiming to violate forward untraceability of an existing RFID scheme does not violate forward untraceability.", 
    "editor": [
      {
        "familyName": "Cuellar", 
        "givenName": "Jorge", 
        "type": "Person"
      }, 
      {
        "familyName": "Lopez", 
        "givenName": "Javier", 
        "type": "Person"
      }, 
      {
        "familyName": "Barthe", 
        "givenName": "Gilles", 
        "type": "Person"
      }, 
      {
        "familyName": "Pretschner", 
        "givenName": "Alexander", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-22444-7_16", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-22443-0", 
        "978-3-642-22444-7"
      ], 
      "name": "Security and Trust Management", 
      "type": "Book"
    }, 
    "keywords": [
      "forward untraceability", 
      "RFID scheme", 
      "privacy model", 
      "formal security proof", 
      "RFID security", 
      "Vaudenay model", 
      "server impersonation", 
      "security proof", 
      "security problems", 
      "untraceability", 
      "RFID system", 
      "ASIACRYPT 2007", 
      "formal model", 
      "strong adversary", 
      "new security", 
      "RFID reader", 
      "understandable one", 
      "security", 
      "scheme", 
      "tags", 
      "attacks", 
      "numerous works", 
      "server", 
      "privacy", 
      "future interactions", 
      "RFID", 
      "impersonation", 
      "Vaudenay", 
      "adversary", 
      "messages", 
      "secrets", 
      "model", 
      "proof", 
      "system", 
      "work", 
      "notion", 
      "one", 
      "readers", 
      "earlier models", 
      "lack", 
      "literature", 
      "interaction", 
      "modification", 
      "resistance", 
      "paper", 
      "problem", 
      "secrets of tag", 
      "valid server"
    ], 
    "name": "Extending an RFID Security and Privacy Model by Considering Forward Untraceability", 
    "pagination": "239-254", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1035492413"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-22444-7_16"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-22444-7_16", 
      "https://app.dimensions.ai/details/publication/pub.1035492413"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-11-01T18:54", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/chapter/chapter_280.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-22444-7_16"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-22444-7_16'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      23 PREDICATES      74 URIs      67 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-22444-7_16 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nee044fe5096043d5ad9f26a838cb0b38
4 schema:datePublished 2011
5 schema:datePublishedReg 2011-01-01
6 schema:description There are numerous works on the privacy and the security problems for RFID systems. However, many of them have failed due to the lack of formal security proof. In the literature, there are a few formal models that consider forward untraceability. In ASIACRYPT 2007, Vaudenay presented an new security and privacy model for RFID that combines early models to more understandable one. In this paper, we revisit Vaudenay’s model and modify it by considering the notion of forward untraceability. Our modification considers all message flows between RFID reader and tags before and after compromising secrets of tag. We analyze some RFID schemes claiming to provide forward untraceability and resistance to server impersonation. For each scheme, we exhibit attacks in which a strong adversary can trace the future interactions of the tag and impersonate the valid server to the tag. Further, we show that a previously proposed attack claiming to violate forward untraceability of an existing RFID scheme does not violate forward untraceability.
7 schema:editor N3484b4358eca433ea43cc7b27ce0781d
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nf6b0cb5488464703866724d8dfd0bf53
12 schema:keywords ASIACRYPT 2007
13 RFID
14 RFID reader
15 RFID scheme
16 RFID security
17 RFID system
18 Vaudenay
19 Vaudenay model
20 adversary
21 attacks
22 earlier models
23 formal model
24 formal security proof
25 forward untraceability
26 future interactions
27 impersonation
28 interaction
29 lack
30 literature
31 messages
32 model
33 modification
34 new security
35 notion
36 numerous works
37 one
38 paper
39 privacy
40 privacy model
41 problem
42 proof
43 readers
44 resistance
45 scheme
46 secrets
47 secrets of tag
48 security
49 security problems
50 security proof
51 server
52 server impersonation
53 strong adversary
54 system
55 tags
56 understandable one
57 untraceability
58 valid server
59 work
60 schema:name Extending an RFID Security and Privacy Model by Considering Forward Untraceability
61 schema:pagination 239-254
62 schema:productId N0ec0b2a3ed4a4352a584a2d977f3db8e
63 Naf93625695534510b3aceec1038e023a
64 schema:publisher Nd2f2c58ed6594625b9062cd053f8b8db
65 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035492413
66 https://doi.org/10.1007/978-3-642-22444-7_16
67 schema:sdDatePublished 2021-11-01T18:54
68 schema:sdLicense https://scigraph.springernature.com/explorer/license/
69 schema:sdPublisher N1be9e35036b64806aef0c492bd13c25b
70 schema:url https://doi.org/10.1007/978-3-642-22444-7_16
71 sgo:license sg:explorer/license/
72 sgo:sdDataset chapters
73 rdf:type schema:Chapter
74 N0ec0b2a3ed4a4352a584a2d977f3db8e schema:name dimensions_id
75 schema:value pub.1035492413
76 rdf:type schema:PropertyValue
77 N1be9e35036b64806aef0c492bd13c25b schema:name Springer Nature - SN SciGraph project
78 rdf:type schema:Organization
79 N21776fc332454c558e7ccc59aa1d380d schema:familyName Lopez
80 schema:givenName Javier
81 rdf:type schema:Person
82 N278406f01b704a3f9c70d62d01d5afcc schema:familyName Cuellar
83 schema:givenName Jorge
84 rdf:type schema:Person
85 N3484b4358eca433ea43cc7b27ce0781d rdf:first N278406f01b704a3f9c70d62d01d5afcc
86 rdf:rest N9cfa727b5f5d4995b8d0acacb62561fc
87 N55cb7c1b250940d4bd6a793a53fe383d rdf:first N67dee02b65ba462695fcd1dc3e61ffc9
88 rdf:rest N703f37672d254e57a79e3504e4b3fd06
89 N67dee02b65ba462695fcd1dc3e61ffc9 schema:familyName Barthe
90 schema:givenName Gilles
91 rdf:type schema:Person
92 N703f37672d254e57a79e3504e4b3fd06 rdf:first N9ec45812733343a7830460b3b6d28825
93 rdf:rest rdf:nil
94 N9cfa727b5f5d4995b8d0acacb62561fc rdf:first N21776fc332454c558e7ccc59aa1d380d
95 rdf:rest N55cb7c1b250940d4bd6a793a53fe383d
96 N9ec45812733343a7830460b3b6d28825 schema:familyName Pretschner
97 schema:givenName Alexander
98 rdf:type schema:Person
99 Naf93625695534510b3aceec1038e023a schema:name doi
100 schema:value 10.1007/978-3-642-22444-7_16
101 rdf:type schema:PropertyValue
102 Nd109b51c762d4860923a596583ad6693 rdf:first sg:person.015011544465.26
103 rdf:rest rdf:nil
104 Nd2f2c58ed6594625b9062cd053f8b8db schema:name Springer Nature
105 rdf:type schema:Organisation
106 Nee044fe5096043d5ad9f26a838cb0b38 rdf:first sg:person.0635104226.42
107 rdf:rest Nd109b51c762d4860923a596583ad6693
108 Nf6b0cb5488464703866724d8dfd0bf53 schema:isbn 978-3-642-22443-0
109 978-3-642-22444-7
110 schema:name Security and Trust Management
111 rdf:type schema:Book
112 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
113 schema:name Information and Computing Sciences
114 rdf:type schema:DefinedTerm
115 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
116 schema:name Data Format
117 rdf:type schema:DefinedTerm
118 sg:person.015011544465.26 schema:affiliation grid-institutes:grid.11220.30
119 schema:familyName Çaǧlayan
120 schema:givenName Mehmet Ufuk
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015011544465.26
122 rdf:type schema:Person
123 sg:person.0635104226.42 schema:affiliation grid-institutes:grid.11220.30
124 schema:familyName Akgün
125 schema:givenName Mete
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0635104226.42
127 rdf:type schema:Person
128 grid-institutes:grid.11220.30 schema:alternateName Computer Engineering Department, Boǧaziçi University, İstanbul, Turkey
129 schema:name Computer Engineering Department, Boǧaziçi University, İstanbul, Turkey
130 Tübitak UEKAE, 41470, Kocaeli, Turkey
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...