Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking
Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW.
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Conference Paper|
|Additional Information:||Full version of accepted short paper.|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000)
Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
|Divisions:||Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2012 [please consult the authors]|
|Deposited On:||26 Apr 2012 04:58|
|Last Modified:||23 Oct 2012 11:55|
Repository Staff Only: item control page