Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security

Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M.E. Tapiador, Esther Palomar, Jan C.A. Van Der Lubbe

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

17 Citations (Scopus)

Abstract

Widespread adoption of RFID technology is being slowed down because of increasing public concerns about associated security threats. This paper shows that it is possible to enhance the security of RFID systems by requiring readers to perform a computational effort test. Readers must solve a cryptographic puzzle - one of the components of the Weakly Secret Bit Commitment (WSBC) sent by tags - to obtain the static identifier of the interrogated tag. The method we present is based on a simple concept already used in security applications such as anti-spam or TCP SYN flooding protection, yet original in the RFID context until now. The scheme provides privacy protection while being an effective countermeasure against the indiscriminate disclosure of the whole contents of a large number of tags. Then, we scrutinize the combined use of cryptographic puzzles and distance-bounding protocols. First, a classical and relatively straight-forward solution is presented. Secondly, we introduce a protocol named Noent, that follows a new approach that reduces drawbacks associated with WSBC such as key delegation, whilst gaining all the advantages of employing distancebounding protocols such as the certainty on the distance between a tag and reader.

Original languageEnglish
Title of host publicationRFID 2010
Subtitle of host publicationInternational IEEE Conference on RFID
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages45-52
Number of pages8
ISBN (Electronic)978-1-4244-5743-4
ISBN (Print)978-1-4244-5742-7
DOIs
Publication statusPublished - 2010
Event4th Annual IEEE International Conference on RFID, RFID 2010 - Orlando, FL, United States
Duration: 14 Apr 201015 Apr 2010

Conference

Conference4th Annual IEEE International Conference on RFID, RFID 2010
CountryUnited States
CityOrlando, FL
Period14/04/1015/04/10

Keywords

  • Cryptographic puzzles
  • Distance-bounding protocols
  • Privacy
  • RFID security
  • Traceability
  • WSBC

Fingerprint Dive into the research topics of 'Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security'. Together they form a unique fingerprint.

Cite this