首页> 外文会议>Information security applications >When Compromised Readers Meet RFID
【24h】

When Compromised Readers Meet RFID

机译:当受损的读者遇到RFID

获取原文
获取原文并翻译 | 示例

摘要

RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end system. The readers must so be able to perform their tasks even in offline mode, what commonly requires the management by the readers of sensitive data. We stress in this paper the problem of compromised readers and its impact in practice. We provide a thorough review of the existing authentication protocols faced to this constraint, and extend our analysis with the privacy property. We show that none of the reviewed protocols fits the required properties in case of compromised readers. We then design a sporadically-online solution that meets our expectations in terms of both security and privacy.
机译:适用于移动环境的基于RFID的访问控制解决方案,例如体育赛事的票务系统通常依赖未与后端系统持续连接的阅读器。读取器必须即使在脱机模式下也必须能够执行其任务,这通常需要读取器对敏感数据进行管理。在本文中,我们强调了受害读者的问题及其在实践中的影响。我们对面临此约束的现有身份验证协议进行了全面的回顾,并使用隐私属性扩展了我们的分析。我们显示,在阅读器受损的情况下,没有经过审查的协议符合要求的属性。然后,我们设计了一个零星在线解决方案,该解决方案在安全性和隐私性方面都可以满足我们的期望。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号