TY - GEN
T1 - Efficient mutual authentication for multi-domain RFID systems using distributed signatures
AU - Braun, Michael
AU - Meyer, Ulrike
AU - Wetzel, Susanne
PY - 2010
Y1 - 2010
N2 - The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy. In addition, our new protocol integrates fine-grained access control and key establishment with mutual authentication. The core of our solution is the use of the concepts of key-splitting and distributed signatures to solve the validation and revocation problem. We show that our protocols can be implemented on RFID tags using lightweight implementations of elliptic curve cryptography.
AB - The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy. In addition, our new protocol integrates fine-grained access control and key establishment with mutual authentication. The core of our solution is the use of the concepts of key-splitting and distributed signatures to solve the validation and revocation problem. We show that our protocols can be implemented on RFID tags using lightweight implementations of elliptic curve cryptography.
KW - Authentication
KW - Data on tag
KW - Distributed signatures
KW - Elliptic curve cryptography
KW - Identity privacy
KW - Key splitting
KW - RFID security
KW - Secret sharing
UR - http://www.scopus.com/inward/record.url?scp=78650376418&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650376418&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-12368-9_9
DO - 10.1007/978-3-642-12368-9_9
M3 - Conference contribution
AN - SCOPUS:78650376418
SN - 3642123678
SN - 9783642123672
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 122
EP - 137
BT - Information Security Theory and Practices
T2 - 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010
Y2 - 12 April 2010 through 14 April 2010
ER -