Deploying OSK on low-resource mobile devices

Avoine, Gildas and Bingöl, Muhammed Ali and Carpent, Xavier and Kardaş, Süleyman (2013) Deploying OSK on low-resource mobile devices. In: 9th International Workshop on Radio Frequency Identification Security and Privacy Issues, Graz, Austria

[thumbnail of Bingol2013_Chapter_DeployingOSKOnLow-ResourceMobi.pdf] PDF
Bingol2013_Chapter_DeployingOSKOnLow-ResourceMobi.pdf
Restricted to Registered users only

Download (382kB) | Request a copy

Abstract

It is a popular challenge to design authentication protocols that are both privacy-friendly and scalable. A large body of literature in RFID is dedicated to that goal, and many inventive mechanisms have been suggested to achieve it. However, to the best of our knowledge, none of these protocols have been tested so far in practical scenarios. In this paper, we present an implementation of the OSK protocol, a scalable and privacy-friendly authentication protocol, using a variant by Avoine and Oechslin that accommodates it to time-memory trade-offs. We show that the OSK protocol is suited to certain real-life scenarios, in particular when the authentication is performed by low-resource mobile devices. The implementation, done on an NFC-compliant cellphone and a ZC7.5 contactless tag, demonstrates the practicability and efficiency of the OSK protocol and illustrates that privacy-by-design is achievable in constrained environments.
Item Type: Papers in Conference Proceedings
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Muhammed Ali Bingöl
Date Deposited: 29 Mar 2019 12:36
Last Modified: 26 Apr 2022 09:31
URI: https://research.sabanciuniv.edu/id/eprint/36920

Actions (login required)

View Item
View Item