Privacy analysis of forward and backward untraceable RFID authentication schemes

Raphael C.W. Phan, Jiang Wu, Khaled Ouafi, Douglas R. Stinson

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

Abstract

In this paper, we analyze the first known provably secure Radio Frequency Identification (RFID) authentication schemes that are designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how to trace tags in the L-K scheme without needing to corrupt tags. We also show that if a standard cryptographic pseudorandom bit generator (PRBG) is used in the S-M scheme, then the schememay fail to provide forward untraceability and backward untraceability. To achieve the desired untraceability features, we show that the S-M scheme can use a robust PRBG which provides forward security and backward security. We also note that the backward security is stronger than necessary for the backward untraceability of the S-M scheme.

Original languageEnglish
Pages (from-to)69-81
Number of pages13
JournalWireless Personal Communications
Volume61
Issue number1
DOIs
Publication statusPublished - Nov 2011
Externally publishedYes

Keywords

  • Analysis
  • Provable security
  • Radio frequency identification
  • Security and privacy in mobile systems
  • Traceability
  • Wireless

Cite this