Anonymous RFID authentication using trusted computing technologies

7Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Anonymity protecting mechanisms are an important part of any Trusted Computing platform. They provide protection of a platform's anonymity and, consequently, protection of the privacy of the platform's owners. As Trusted Computing technologies have been introduced on mobile and embedded systems and more and more mobile devices are equipped with Near Field Communication (NFC) modules, the question arises whether the supported anonymization mechanisms can be used efficiently for anonymous authentication for NFC enabled applications. However, state-of-the-art technologies like the Direct Anonymous Attestation scheme require complex mathematical computations that put high requirements on the processing power of the signer's device which are typically not available on resource constrained devices like smart-cards. In this paper, we analyze how the Direct Anonymous Attestation protocol can be used for anonymous authentication in NFC scenarios and we propose an approach that allows a practical use of this technology in real-world scenarios. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Dietrich, K. (2010). Anonymous RFID authentication using trusted computing technologies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6370 LNCS, pp. 91–102). https://doi.org/10.1007/978-3-642-16822-2_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free