{"id":459,"date":"2013-12-13T18:13:35","date_gmt":"2013-12-13T17:13:35","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/2013\/12\/13\/problemes-lies-a-lauthentification-dans-les-rfid-a-bas-couts\/"},"modified":"2020-09-04T18:46:56","modified_gmt":"2020-09-04T16:46:56","slug":"problemes-lies-a-lauthentification-dans-les-rfid-a-bas-couts","status":"publish","type":"post","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/2013\/12\/13\/problemes-lies-a-lauthentification-dans-les-rfid-a-bas-couts\/","title":{"rendered":"\u00ab\u00a0Probl\u00e8mes li\u00e9s \u00e0 l&rsquo;authentification dans les RFID \u00e0 bas co\u00fbts\u00a0\u00bb"},"content":{"rendered":"<p>THESE DE DOCTORAT<br \/>\nM. Ethmane EL MOUSTAINE<br \/>\nT\u00e9l\u00e9com SudParis &#8211; EDITE<\/p>\n<p><strong>Ethmane EL MOUSTAINE<\/strong> a le plaisir de vous inviter \u00e0 sa soutenance de th\u00e8se qui aura lieu \u00e0 T\u00e9l\u00e9com SudParis, vendredi le <strong>13 d\u00e9cembre 2013<\/strong> \u00e0 10h00 en salle A003 <\/p>\n<p> Sujet de la th\u00e8se : <strong>Probl\u00e8mes li\u00e9s \u00e0 l&rsquo;authentification dans les RFID \u00e0 bas co\u00fbts.<\/strong><\/p>\n<p><strong> Jury :<\/strong><\/p>\n<ul>\n<li> M. Abdelmadjid Bouabdallah                               Rapporteur                      Universit\u00e9 Technologique de Compi\u00e8gne, France<\/li>\n<li> M. Mohamed Hamdi                                               Rapporteur                      Ecole Sup\u00e9rieure des Communications de Tunis, Tunisie<\/li>\n<li> M. Jean-Jacques Quisquater                                Examinateur                    Universit\u00e9 Catholique de Louvain, Belgique<\/li>\n<li> M. Pierre Sens                                                         Examinateur                    Universit\u00e9 Pierre et Marie Curie, France<\/li>\n<li> M. Refik Molva                                                         Examinateur                    EURECOM Sophia Antipolis, France<\/li>\n<li> Mme. Maryline Laurent                                           Directrice de th\u00e8se         T\u00e9l\u00e9com SudParis, France<\/li>\n<\/ul>\n<p><strong>R\u00e9sum\u00e9 :<\/strong><\/p>\n<p>Dans cette th\u00e8se nous nous int\u00e9ressons aux probl\u00e8mes li\u00e9s \u00e0 l\u2019authentification dans la technologie de l&rsquo;identification par radio fr\u00e9quence (RFID). Cette technologie est l\u2019une des technologies les plus prometteuses dans le domaine de l\u2019informatique ubiquitaire, elle est souvent d\u00e9sign\u00e9e comme la prochaine r\u00e9volution apr\u00e8s Internet. Cependant, \u00e0 cause des ressources tr\u00e8s limit\u00e9es en termes de calcul, m\u00e9moire et \u00e9nergie sur les \u00e9tiquettes RFID, les algorithmes classiques de s\u00e9curit\u00e9 ne peuvent pas \u00eatre impl\u00e9ment\u00e9s sur les \u00e9tiquettes \u00e0 bas co\u00fbt rendant ainsi la s\u00e9curit\u00e9 et la vie priv\u00e9e un important sujet de recherche aujourd\u2019hui.<\/p>\n<p>Dans un premier temps, nous \u00e9tudions le passage \u00e0 l\u2019\u00e9chelle dans les syst\u00e8mes RFID \u00e0 bas co\u00fbt en d\u00e9veloppant un module pour ns-3 qui simule le standard EPC Class 1 Generation 2 pour \u00e9tablir un cadre stricte pour l\u2019identification s\u00e9curis\u00e9e des RFID \u00e0 bas co\u00fbt, ce qui nous conduit \u00e0 l\u2019utilisation de la cryptographie \u00e0 cl\u00e9s publiques.<\/p>\n<p>Ensuite, nous proposons un protocole d\u2019authentification bas\u00e9 sur une adaptation que nous avons introduit sur le c\u00e9l\u00e8bre cryptosyst\u00e8me NTRU. Ce protocole est sp\u00e9cialement con\u00e7u pour les RFID \u00e0 bas co\u00fbt comme les \u00e9tiquettes n\u2019impl\u00e9mentent que des op\u00e9rations simples (xor, d\u00e9calages, addition) et il garantit le passage \u00e0 l\u2019\u00e9chelle.<\/p>\n<p>Enfin, nous consid\u00e9rons l\u2019identification \u00e0 divulgation nulle de connaissance, ce type d\u2019approches est tr\u00e8s utile dans de nombreuses applications RFID. Nous proposons deux protocoles \u00e0 divulgation nulle de connaissance bas\u00e9s sur cryptoGPS et cryptoGPS randomis\u00e9. Ces approches consistent \u00e0 stocker sur le serveur des coupons pr\u00e9-calcul\u00e9s, ainsi la s\u00e9curit\u00e9 et la vie priv\u00e9e sont mieux support\u00e9es que dans les autres approches de ce type.<\/p>\n<p><strong>Abstract:<br \/>\n<\/strong><\/p>\n<p>This thesis focuses on issues related to authentication in low-cost radio frequency identification technology, more commonly referred to as RFID. This technology it is often referred to as the next technological revolution after the Internet. However, due to the very limited resources in terms of computation, memory and energy on RFID tags, conventional security algorithms cannot be implemented on low-cost RFID tags making security and privacy<\/p>\n<p>an important research subject today.<\/p>\n<p>First of all, we investigate the scalability in low-cost RFID systems by developing a ns-3 module to simulate the universal low-cost RFID standard EPC Class-1 Generation-2 in order to establish a strict framework for secure identification in low-cost RFID systems. We show that, the symmetrical key cryptography is excluded from being used in any scalable low-cost RFID standard.<\/p>\n<p>Then, we propose a scalable authentification protocol based on our adaptation of the famous public key cryptosystem NTRU. This protocol is specially designed for low-cost RFID systems, it can be efficiently implemented into low-cost tags.<\/p>\n<p>Finally, we consider the zero-knowledge identification i.e. when the no secret sharing between the tag and the reader is needed. Such identification approaches are very helpful in many RFID applications when the tag changes constantly the field of administration. We propose two lightweight zero-knowledge identification approaches based on GPS and randomized GPS schemes. The proposed approaches consist in storing in the back-end precomputed values in the form of coupons. So, the GPS-based variant can be private and the number of coupons can be much higher than in other approaches thus leading to higher resistance to denial of service<\/p>\n<p>attacks for cheaper tags.<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>THESE DE DOCTORAT M. Ethmane EL MOUSTAINE T\u00e9l\u00e9com SudParis &#8211; EDITE Ethmane EL MOUSTAINE a le plaisir de vous inviter \u00e0 sa soutenance de th\u00e8se qui aura lieu \u00e0 T\u00e9l\u00e9com SudParis, vendredi le 13 d\u00e9cembre 2013 \u00e0 10h00 en salle A003 Sujet de la th\u00e8se : Probl\u00e8mes li\u00e9s \u00e0 l&rsquo;authentification dans les RFID \u00e0 bas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[400],"tags":[],"class_list":["post-459","post","type-post","status-publish","format-standard","hentry","category-theses-2013-fr","entry"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=459"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/459\/revisions"}],"predecessor-version":[{"id":1828,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/459\/revisions\/1828"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/categories?post=459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/tags?post=459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}