Deploying OSK on low-resource mobile devices

Warning The system is temporarily closed to updates for reporting purpose.

Avoine, Gildas and Bingöl, Muhammed Ali and Carpent, Xavier and Kardaş, Süleyman (2013) Deploying OSK on low-resource mobile devices. In: 9th International Workshop on Radio Frequency Identification Security and Privacy Issues, Graz, Austria

[img]PDF - Registered users only - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader

Official URL: http://dx.doi.org/10.1007/978-3-642-41332-2_1


It is a popular challenge to design authentication protocols that are both privacy-friendly and scalable. A large body of literature in RFID is dedicated to that goal, and many inventive mechanisms have been suggested to achieve it. However, to the best of our knowledge, none of these protocols have been tested so far in practical scenarios. In this paper, we present an implementation of the OSK protocol, a scalable and privacy-friendly authentication protocol, using a variant by Avoine and Oechslin that accommodates it to time-memory trade-offs. We show that the OSK protocol is suited to certain real-life scenarios, in particular when the authentication is performed by low-resource mobile devices. The implementation, done on an NFC-compliant cellphone and a ZC7.5 contactless tag, demonstrates the practicability and efficiency of the OSK protocol and illustrates that privacy-by-design is achievable in constrained environments.

Item Type:Papers in Conference Proceedings
ID Code:36920
Deposited By:Muhammed Ali Bingöl
Deposited On:29 Mar 2019 12:36
Last Modified:22 May 2019 14:13

Repository Staff Only: item control page