RFID

The emergence of smart environments where computing devices are embedded pervasively in the physical world has made possible many interesting applications and triggered several new research areas. Mobile ad hoc networks (MANETs), sensor networks, and RFID systems are all examples of such pervasive systems, operating with constrained resources, that intelligently configure and connect themselves. Operating on an open medium and lacking fixed infrastructure, such networks suffer from critical security vulnerabilities, for which few satisfactory solutions currently exist, particularly with respect to availability and denial-ofservice attacks. In addition, much of the extant knowledge in network security and cryptography cannot be readily transfered to the newer settings, which involve weaker devices, and less structured and less redundant networks. For these reasons, traditional security approaches, in particular regarding provision of availability, are often inappropriate for the context of ubiquitous computing.

In this project we investigate the security of pervasive systems with focus on availability issues in the presence of Byzantine faults. Our goal is to formulate rigorous simulation frameworks for analyzing security objectives; and more importantly to design novel mechanisms and algorithms that achieve proven availability, uninterrupted services, high efficiency, and low overhead in such systems. Whenever possible, we favor approaches that integrate security into existing protocols that are well established in the literature. Our focus will be on securing MANET and RFID applications.

Publications

  • Mike Burmester. `Localization privacy'. Lecture Notes in Computer Science #6805, Festschrift Jean-Jacques Quisquater, Springer, 2011.
  • Mike Burmester. 'His Late Master's Voice: barking for location privacy'. Proceedings, 19th International Workshop on Security Protocols, Cambridge, England, March 28-30, 2011 (WSP 2011). Lecture Notes in Computer Science #7114, Springer, 2011.
  • Mike Burmester and Jorge Munilla. `Flyweight authentication with forward and backward security'. ACM Transactions on Information and System Security, 14(1): 11 (2011).
  • Mike Burmester and Jorge Munilla. `Flyweight authentication with forward and backward security'. WISP Summit 2009, First workshop on Wirelessly Powered Sensor Networks and Computational RFID, November 3, 2009, Berkeley, California.
  • Mike Burmester, Breno de Medeiros, Jorge Munilla, and Alberto Peinado. `Secure EPC Gen2 compliant Radio Frequency Identification'. 8th International Conference on AD-HOC Networks & Wireless, ADHOC-NOW 2009, Murcia, Spain, 22-25 September, 2009.
  • Mike Burmester and Jorge Munilla. `A Flyweight RFID Authentication Protocol'. Workshop on RFID Security 2009, RFIDSec2009, Leuven, Belgium, June 30 - July 2, 2009.
  • Mike Burmester, Tri van Le, Breno de Medeiros and Gene Tsudik. `Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols'. ACM Transactions on Information and System Security (TISSEC) (2009).
  • Mike Burmester, Breno de Medeiros and Rossana Motta. `Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries'. IJACT 1(2): 79-90 (2008).
  • Mike Burmester, Breno de Medeiros Rossana Motta. `Provably Secure Grouping-proofs for RFID tags'. International Conference, 8th Smart Card Research and Advanced Applications (CARDIS 2008), IFIP WG 8.8/11.2, September 8-11, 2008. Also, Cryptology ePrint Archive, 2007/407.
  • Mike Burmester, Breno de Medeiros. `The Security of EPCGen2 Anonymous compliant RFID Protocols'. International Conference on Applied Cryptography and Network Security, ACNS 2008, Columbia University, New York, June 2008.
  • Mike Burmester, Breno de Medeiros Rossana Motta. `Robust Anonymous RFID Authentication with Constant Key Lookup'. ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, March 2008. Also, Cryptology ePrint Archive, 2007/402.
  • Mike Burmester and Breno de Medeiros. `Persistent Security for RFID'. Conference on RFID Security, RFIDSec07, Malaga, July, 2007.
  • Mike Burmester and Breno de Medeiros. `RFID Security, Countermeasures and Challenges'. 5th RFID Academic Convocation, The RFID Journal Conference, Orlando, April 30 - May 2, 2007.
  • Tri van Le, Mike Burmester Breno de Medeiros. `Universally Composable and Forward Secure RFID Authentication and Key exchange'. ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 2007.
  • Mike Burmester, Tri van Le and Breno de Medeiros. `Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols'. 2nd Int. Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, Aug 2006.
  • Mike Burmester, Tri van Le, and Breno de Medeiros. `Towards provable security for ubiquitous applications'. Proc. 11th Australasian Conf. on Information Security and Privacy (ACISP 2006), Melbourne, Australia, July 2006, Lecture Notes in Computer Science #4058, Springer, 2006, pp. 295-312.
  • Christy Chatmon, Tri van Le and Mike Burmester. `Secure Anonymous RFID Protocols'. FSU Technical Report TR-060112.


SAIT Logo FSU Logo