Deploying OSK on Low-Resource Mobile Devices
It is a popular challenge to design authentication protocols that are both privacy-friendly and scalable. A large body of literature in RFID is dedicated to that goal, and many inventive mechanisms have been suggested to achieve it. However, to the best of our knowledge, none of these protocols have been tested so far in practical scenarios. In this paper, we present an implementation of the OSK protocol, a scalable and privacy-friendly authentication protocol, using a variant by Avoine and Oechslin that accommodates it to time-memory trade-offs. We show that the OSK protocol is suited to certain real-life scenarios, in particular when the authentication is performed by low-resource mobile devices. The implementation, done on an NFC-compliant cellphone and a ZC7.5 contactless tag, demonstrates the practicability and efficiency of the OSK protocol and illustrates that privacy-by-design is achievable in constrained environments.
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link
Citation : Avoine G., Bingöl M.A., Carpent X., Kardaş S. (2013) Deploying OSK on Low-Resource Mobile Devices. In: Hutter M., Schmidt J.M. (Eds.) Radio Frequency Identification. RFIDSec 2013. Berlin, Heidelberg: Springer.
ISBN : 9783642413315
Research Institute : Cyber Technology Institute (CTI)
Peer Reviewed : Yes