Demo: The Ff Hardware Prototype for Privacy-Preserving RFID Authentication

被引:0
|
作者
Blass, Erik-Oliver [1 ]
Elkhiyaoui, Kaoutar [1 ]
Molva, Refik [1 ]
Savry, Olivier [2 ]
Verilhac, Cedric [2 ]
机构
[1] EURECOM, Sophia Antipolis, France
[2] CEA LETI, Grenoble, France
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this demo, we present the realization and evaluation of a wireless hardware prototype of the previously proposed RFID authentication protocol "F-f". The motivation has been to get as close as possible to the (expensive) construction of a wafer and to analyze and demonstrate F-f 's real-world feasibility and functional correctness in the field. Besides showing F-f 's feasibility, our objective is to show implications of embedding authentication into an industry RFID communication standard. Apart from the documentation at hand, the demonstrator comprises the F-f RFID tag and reader prototypes and a standard EPC tag and reader. The hardware is connected to a laptop controlling the hardware and simulating attacks against authentication.
引用
收藏
页码:737 / 739
页数:3
相关论文
共 50 条
  • [21] Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs
    Zhang, Zihou
    Li, Jiangtao
    Li, Yufeng
    Cao, Chenhong
    Cao, Zhenfu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6337 - 6350
  • [22] Demo: PDNS: A Fully Privacy-Preserving DNS
    Xiao, Yunming
    Weng, Chenkai
    Yu, Ruijie
    Liu, Peizhi
    Varvello, Matteo
    Kuzmanovic, Aleksandar
    PROCEEDINGS OF THE 2023 ACM SIGCOMM 2023 CONFERENCE, SIGCOMM 2023, 2023, : 1182 - 1184
  • [23] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [24] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [25] Privacy-preserving authentication using fingerprint
    Feng, Q. (fquan@sina.com), 1600, ICIC International (08):
  • [26] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [27] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [28] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [29] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [30] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    SN Computer Science, 4 (5)