A Privacy-Restoring Mechanism for Offline RFID Systems
Gildas Avoine Iwen Coisel Tania Martin
Universit´ e catholique de Louvain Belgium
April 16, 2012
[WiSec’12, Tucson, AZ, USA]
A Privacy-Restoring Mechanism for Offline RFID Systems Gildas - - PowerPoint PPT Presentation
A Privacy-Restoring Mechanism for Offline RFID Systems Gildas Avoine Iwen Coisel Tania Martin Universit e catholique de Louvain Belgium April 16, 2012 [WiSec12, Tucson, AZ, USA] Goal of our Paper Authentication protocol that
Universit´ e catholique de Louvain Belgium
[WiSec’12, Tucson, AZ, USA]
2
3
4
5
5
5
1 Our Protocol 2 Privacy Analysis 3 Efficiency Analysis 4 Implementation
6
7
CORRUPT
7
CORRUPT
7
7
8
9
R , Knew R )
R , vnew R
R
= {∀T : (IDT, snew
TR )}
R
10
R , Knew R )
R , vnew R
R
= {∀T : (IDT, snew
TR )}
R
10
CR, nR
− − − − − − − − →
E
← − − − − − − − −
NewCT
→ Updates its values
NewCR
− − − − − − − − →
→ Updates its values
10
CR, nR
− − − − − − − − →
E
← − − − − − − − −
NewCT
→ Updates its values
NewCR
− − − − − − − − →
→ Updates its values
10
CR, nR
− − − − − − − − →
E
← − − − − − − − −
NewCT
→ Updates its values
NewCR
− − − − − − − − →
→ Updates its values
10
10
10
10
10
10
10
10
10
10
10
10
10
10
10
1 Our Protocol 2 Privacy Analysis 3 Efficiency Analysis 4 Implementation
11
1
2
3
4
5
6
12
13
1 Our Protocol 2 Privacy Analysis 3 Efficiency Analysis 4 Implementation
14
15
0.2 0.4 0.6 0.8 1 3rd day 2nd day 1st day Advantage to trace one tag Time t 1st day, 6AM 1st day, 12PM 2nd day, 6AM 2nd day, 12PM 3rd day, 6AM 3rd day, 12PM
16
1 Our Protocol 2 Privacy Analysis 3 Efficiency Analysis 4 Implementation
17
18
19
19