Avoine, Gildas and Bingöl, Muhammed Ali and Carpent, Xavier and Kardaş, Süleyman (2013) Deploying OSK on low-resource mobile devices. In: 9th International Workshop on Radio Frequency Identification Security and Privacy Issues, Graz, Austria
PDF
Bingol2013_Chapter_DeployingOSKOnLow-ResourceMobi.pdf
Restricted to Registered users only
Download (382kB) | Request a copy
Bingol2013_Chapter_DeployingOSKOnLow-ResourceMobi.pdf
Restricted to Registered users only
Download (382kB) | Request a copy
Official URL: http://dx.doi.org/10.1007/978-3-642-41332-2_1
Abstract
It is a popular challenge to design authentication protocols that are both privacy-friendly and scalable. A large body of literature in RFID is dedicated to that goal, and many inventive mechanisms have been suggested to achieve it. However, to the best of our knowledge, none of these protocols have been tested so far in practical scenarios. In this paper, we present an implementation of the OSK protocol, a scalable and privacy-friendly authentication protocol, using a variant by Avoine and Oechslin that accommodates it to time-memory trade-offs. We show that the OSK protocol is suited to certain real-life scenarios, in particular when the authentication is performed by low-resource mobile devices. The implementation, done on an NFC-compliant cellphone and a ZC7.5 contactless tag, demonstrates the practicability and efficiency of the OSK protocol and illustrates that privacy-by-design is achievable in constrained environments.
Item Type: | Papers in Conference Proceedings |
---|---|
Divisions: | Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng. Faculty of Engineering and Natural Sciences |
Depositing User: | Muhammed Ali Bingöl |
Date Deposited: | 29 Mar 2019 12:36 |
Last Modified: | 26 Apr 2022 09:31 |
URI: | https://research.sabanciuniv.edu/id/eprint/36920 |