Archives and Documentation Center
Digital Archives

Security and privacy analysis of authentication protocols in RFID systems

Show simple item record

dc.contributor Ph.D. Program in Electrical and Electronic Engineering.
dc.contributor.advisor Anarım, Emin.
dc.contributor.author Ergüler, İmran.
dc.date.accessioned 2023-03-16T10:25:03Z
dc.date.available 2023-03-16T10:25:03Z
dc.date.issued 2011.
dc.identifier.other EE 2011 E74 PhD
dc.identifier.uri http://digitalarchive.boun.edu.tr/handle/123456789/13098
dc.description.abstract Radio Frequency IDentification (RFID) technology continues to flourish as an inherent part of virtually every ubiquitous environment. However, it became clear that the public— implying the industry— seriously needs mechanisms emerging the security and privacy issues for increasing RFID applications. This thesis examines security and privacy of RFID authentication protocols and presents three main contributions. First, we show that RFID protocols having unbalanced states for which tag identification is performed in different order of computational complexities are subject to side-channel attacks and do not preserve the RFID privacy. Second, we introduce a timing attack such that if the database querying in tag identification is performed through a static process, RFID protocol is vulnerable to the proposed attack that could easily jeopardize the system’s untraceability criteria. We formulate success probability of our attack and demonstrate its success on some well known protocols. Finally, we analyze security of RFID delegation systems and present an unnoticed security flaw that makes tag impersonation attack possible. To overcome these weakness, we give some possible countermeasures.
dc.format.extent 30cm.
dc.publisher Thesis (Ph.D.)-Bogazici University. Institute for Graduate Studies in Science and Engineering, 2011.
dc.subject.lcsh Sensor networks -- Security measures.
dc.subject.lcsh Radio frequency identification systems -- Security measures.
dc.title Security and privacy analysis of authentication protocols in RFID systems
dc.format.pages xiv, 136 leaves ;


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Archive


Browse

My Account