Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CSF.2010.13guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Formal Verification of Privacy for RFID Systems

Published: 17 July 2010 Publication History

Abstract

RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their wireless nature, introduces privacy concerns as a tag could leak information about the owner’s behaviour. In this paper we define two privacy notions, unlinkability and forward privacy, using a formal model based on the applied pi calculus, and we show the relationship between them. Then we focus on a generic class of simple privacy protocols, giving sufficient and necessary conditions for unlinkability and forward privacy for this class. These conditions are based on the concept of frame independence that we develop in this paper. Finally, we apply our techniques to two identification protocols, formally proving their privacy guarantees.

Cited By

View all
  1. Formal Verification of Privacy for RFID Systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      CSF '10: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium
      July 2010
      333 pages
      ISBN:9780769540825

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 17 July 2010

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Typing Messages for Free in Security ProtocolsACM Transactions on Computational Logic10.1145/334350721:1(1-52)Online publication date: 12-Sep-2019
      • (2019)Review of different classes of RFID authentication protocolsWireless Networks10.1007/s11276-017-1638-325:3(961-974)Online publication date: 1-Apr-2019
      • (2017)A Cross-Layer and Optimized Privacy Method in Vehicular Ad-Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4599-z97:3(3331-3353)Online publication date: 1-Dec-2017
      • (2017)Analysis of privacy in mobile telephony systemsInternational Journal of Information Security10.1007/s10207-016-0338-916:5(491-523)Online publication date: 1-Oct-2017
      • (2015)From Security Protocols to Pushdown AutomataACM Transactions on Computational Logic10.1145/281126217:1(1-45)Online publication date: 23-Sep-2015
      • (2015)Formal verification of e-votingACM SIGLOG News10.1145/2728816.27288232:1(25-34)Online publication date: 28-Jan-2015
      • (2015)Composing Security ProtocolsProceedings of the 4th International Conference on Principles of Security and Trust - Volume 903610.1007/978-3-662-46666-7_17(324-343)Online publication date: 11-Apr-2015
      • (2014)KEDGEN2Journal of Network and Computer Applications10.5555/3170014.317015339:C(152-166)Online publication date: 1-Mar-2014
      • (2014)Formal Models and Techniques for Analyzing Security ProtocolsFoundations and Trends in Programming Languages10.1561/25000000011:3(151-267)Online publication date: 13-Nov-2014
      • (2012)Linking UnlinkabilityRevised Selected Papers of the 7th International Symposium on Trustworthy Global Computing - Volume 819110.1007/978-3-642-41157-1_9(129-144)Online publication date: 7-Sep-2012
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media