Security and Privacy in RFID Systems

作者: Nan Li , None

DOI:

关键词:

摘要: Radio Frequency Identification (RFID) technology has been widely applied in many applications, such as the supply chain and warehouse management. A typical RFID system consists of tags, readers a back-end server. Usually, tag is constrained device attached to an object. It can be scanned by reader identified An important branch research authentication protocols. There have works addressing issues. The security privacy protocols become hot topics. Many proposed achieve various requirements. According different features protocols, related issues should considered. solutions, including model definition protocol analysis, are major work this thesis. Some existing attempted strong privacy. Unfortunately, even if they sacrifice efficiency cost most them cannot reach highest level called wide-strong To address issue, we review these problems previous propose some potential solutions. We then present private with formal proof also study scenario that server only assist authenticate tags without obtaining any tag’s identity. Accordingly, introduce novel concept authorized three adapt environments. As extension ownership transfer transfers from current owner new owner. precondition verify validity tags. Apart authentication, it necessary check authenticity Based on observation, solve problem secure protocol. Moreover, may shared multiple users. allowed all owners agree. In environment where trusted third party unavailable, one needs prevent forging agreements others. hybrid stores constant-size secret keys individually prove partial ownership. guarantees transferred prior presence full agreement.

参考文章(131)
Shingo Kinoshita, Miyako Ohkubo, Koutarou Suzuki, Cryptographic Approach to “Privacy-Friendly” Tags ,(2003)
Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel, A New RFID Privacy Model Computer Security – ESORICS 2011. pp. 568- 587 ,(2011) , 10.1007/978-3-642-23822-2_31
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Florian Michahelles, Securing RFID Systems by Detecting Tag Cloning international conference on pervasive computing. pp. 291- 308 ,(2009) , 10.1007/978-3-642-01516-8_20
Panagiotis Rizomiliotis, Stefanos Gritzalis, GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol Applied Cryptography and Network Security. pp. 489- 506 ,(2012) , 10.1007/978-3-642-31284-7_29
Roel Maes, Ingrid Verbauwhede, Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions Information Security and Cryptography. pp. 3- 37 ,(2010) , 10.1007/978-3-642-14452-3_1
Ton van Deursen, Saša Radomirović, Insider attacks and privacy of RFID protocols european public key infrastructure workshop. pp. 91- 105 ,(2011) , 10.1007/978-3-642-29804-2_6
Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan, Privacy-Preserving Authorized RFID Authentication Protocols radio frequency identification security and privacy issues. pp. 108- 122 ,(2014) , 10.1007/978-3-319-13066-8_7
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay, Towards Secure Distance Bounding Fast Software Encryption. pp. 55- 67 ,(2014) , 10.1007/978-3-662-43933-3_4
Vijay Varadharajan, Yi Mu, Willy Susilo, Nan Li, Fuchun Guo, On RFID authentication protocols with wide-strong privacy RFIDSec Asia. pp. 3- 16 ,(2013) , 10.3233/978-1-61499-328-5-3
Albert Fernàndez-Mir, Rolando Trujillo-Rasua, Jordi Castellà-Roca, Josep Domingo-Ferrer, A scalable RFID authentication protocol supporting ownership transfer and controlled delegation international conference on rfid. pp. 147- 162 ,(2011) , 10.1007/978-3-642-25286-0_10