In RFID systems addressing security issues, many authentication techniques require the tag to keep some sort of synchronization with the reader. In particular, this is true in those proposals that leverage hash chains. When the reader and the tag get de-synchronized, possibly by an attacker, this paves the way to several denial of service (DoS) attacks, as well as threatening privacy (e.g., via the timing attack). Even if de-synchronization happens for non-malicious causes, this event has a negative effect on performances (for instance, slowing down the authentication process). In this paper, we provide a solution to cope with the de-synchronization between the tag and the reader when hash chains are employed. In particular, our solution relies on mutual reader-tag authentication, achieved via hash traversal and Merkle tree techniques. We show that this techniques applied to an existing security protocol for RFID systems, such as RIPP-FS, make timing attacks hard to succeed. Moreover, the proposed solutions can be transparently and independently adopted by similar security protocols as well to thwart timing attack and/or to provide reader-tag mutual authentication. Finally, extensive simulations show that our proposal introduces a negligible overhead to recover desynchronization. © 2009 John Wiley & Sons, td.

eRIPP-FS: Enforcing privacy and security in RFID / Mauro, Conti; Roberto Di, Pietro; Mancini, Luigi Vincenzo; Spognardi, Angelo. - In: SECURITY AND COMMUNICATION NETWORKS. - ISSN 1939-0114. - 3:1(2010), pp. 58-70. [10.1002/sec.120]

eRIPP-FS: Enforcing privacy and security in RFID

MANCINI, Luigi Vincenzo;SPOGNARDI, Angelo
2010

Abstract

In RFID systems addressing security issues, many authentication techniques require the tag to keep some sort of synchronization with the reader. In particular, this is true in those proposals that leverage hash chains. When the reader and the tag get de-synchronized, possibly by an attacker, this paves the way to several denial of service (DoS) attacks, as well as threatening privacy (e.g., via the timing attack). Even if de-synchronization happens for non-malicious causes, this event has a negative effect on performances (for instance, slowing down the authentication process). In this paper, we provide a solution to cope with the de-synchronization between the tag and the reader when hash chains are employed. In particular, our solution relies on mutual reader-tag authentication, achieved via hash traversal and Merkle tree techniques. We show that this techniques applied to an existing security protocol for RFID systems, such as RIPP-FS, make timing attacks hard to succeed. Moreover, the proposed solutions can be transparently and independently adopted by similar security protocols as well to thwart timing attack and/or to provide reader-tag mutual authentication. Finally, extensive simulations show that our proposal introduces a negligible overhead to recover desynchronization. © 2009 John Wiley & Sons, td.
2010
tag identification; rfid; authentication; privacy; synchronization; forward secrecy
01 Pubblicazione su rivista::01a Articolo in rivista
eRIPP-FS: Enforcing privacy and security in RFID / Mauro, Conti; Roberto Di, Pietro; Mancini, Luigi Vincenzo; Spognardi, Angelo. - In: SECURITY AND COMMUNICATION NETWORKS. - ISSN 1939-0114. - 3:1(2010), pp. 58-70. [10.1002/sec.120]
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/377910
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 5
social impact