When Compromised Readers Meet RFID

9 years 4 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end system. The readers must so be able to perform their tasks even in offline mode, what commonly requires the management by the readers of sensitive data. We stress in this paper the problem of compromised readers and its impact in practice. We provide a thorough review of the existing authentication protocols faced to this constraint, and extend our analysis with the privacy property. We show that none of the reviewed protocols fits the required properties in case of compromised readers. We then design a sporadically-online solution that meets our expectations in terms of both security and privacy.
Gildas Avoine, Cédric Lauradoux, Tania Mart
Added 25 May 2010
Updated 25 May 2010
Type Conference
Year 2009
Where WISA
Authors Gildas Avoine, Cédric Lauradoux, Tania Martin
Comments (0)