Secure communication for RFIDs proactive information security within computational security

Shlomi Dolev, Marina Kopeetsky

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

We consider repeated communication sessions between a sender (e.g., Radio Frequency Identification, RFID, reader) and a receiver (RFID). A proactive information security scheme is proposed. The scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. Then a computational secure scheme based on the information secure scheme is used to ensure that even in the case that the adversary listens to all the information exchanges, the communication between the sender and the receiver is secure. In particular, the scheme can be used in the domain of remote controls (e.g., for cars).

Original languageEnglish
Title of host publicationStabilization, Safety, and Security of Distributed Systems - 8th International Symposium, SSS 2006. Proceedings
PublisherSpringer Verlag
Pages290-303
Number of pages14
ISBN (Print)3540490183, 9783540490180
DOIs
StatePublished - 1 Jan 2006
Event8th International Symposium on Self-Stabilizing Systems, SSS 2006 - Dallas, TX, United States
Duration: 17 Nov 200619 Nov 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4280 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Symposium on Self-Stabilizing Systems, SSS 2006
Country/TerritoryUnited States
CityDallas, TX
Period17/11/0619/11/06

Keywords

  • Authentication protocol
  • Computational security
  • Information security
  • Pseudo-random numbers
  • RFID tags

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Secure communication for RFIDs proactive information security within computational security'. Together they form a unique fingerprint.

Cite this