Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection
|
|
|
- Belinda Bryant
- 10 years ago
- Views:
Transcription
1 Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection YUNG-CHIN CHEN 1,*, WEI-LIN WANG 1, AND MIN-SHIANG HWANG 2 1 Department of Computer and Communication Engineering, Asia University, Taiwan 2 Department of Information Management, National Chung Hsing University, Taiwan ABSRACT RFID (Radio Frequency Identification) is one of the most promising NFC (Near Field Communication) communication technologies for pervasive and ubiquitous network societies in recent years. The main factor for more and more interests from both industry and academic institutes is its great potential for various applications, which are closely related to our daily life, due partially to lowering prices. The implementation of RFID systems, however, has also raised concerns regarding information security and violations of end-user privacy. Due to lower prices and weaker privacy protection in RFID tags. A feasible security mechanism for anti-counterfeiting and privacy protection is proposed by exploring XOR operations and random number shift methods to enhance RFID tag s security but with relative low costs. Key words: RFID, ubiquitous, counterfeiting, XOR, random number. 1. INTRODUCTION An RFID system generally consists of three primary components including readers, tags and middleware (API) that possess identification, renewable, and reusable characteristics. Applications of RFID has been increasing over the past few years in various areas due to the popularization pushed by Wal-Mart and the DoD of the USA. Apart from the applications in supply chain, logistics, retail, and transportation, opportunities for manufacturing processes management, security, electronic toll systems, library management systems and healthcare are also full of potential (Finkenzeller, 2003; Srivastava, 2005;.Garfinkel & Rosenberg, 2005; Shepard, 2005; Weis, Sarma, & Rivest, 2003). It is expected that our daily life would become more convenient due to such applications in the future. Security and privacy protection, however, will be an issue after wide-spread adoption of the RFID system due to the lowering of the tags price. The design of low-price tags is simple in terms of using fewer gates and vulnerable to eavesdropping as a result (Ranasinghe, Engels, & Cole, 2005). Researchers have addressed the security risks of low-price RFID tags and proposed some possible solutions including killing the tags at the check, applying a rewritable memory, mutual-authentication (Yang, Park, Lee, Ren, & Kim, 2005; Lopez, Castro, Tapiador, & Ribagordaj, 2006; Chang, 2005), the key diversification scheme (Chang, 2005), hash function encryption (Weis et al., 2003; Kim, Oh, Choi, & Kim, 2006; Gao et al., 2004; Oertel, Wolk, Hilyt, & Kohler, 2005; Henrici & Muller, 2004; Dimitriou, 2005), and the XOR algorithm (Yang, Ren, & Kim, 2005; Zhang & Zhou, 2005; Li, Jeong, Sun, & Lee, * Corresponding author. [email protected] 189
2 2006). In this paper a low-cost approach with proper protection exploring the XOR algorithm is proposed. 2. SECURITY MECHANISM There are basically two approaches to dealing with the risks of security and privacy. One is to kill or disable the tags and the other is the adoption of tags with access control functionality that only responds to authorized readers. On the other hand, RFID tags are designed to authenticate the reader first before responding to any reader. When the reader sends out a query, the tag encrypts its ID together with a random number R using the reader s public key. Because thereader s signal for each interrogation is different, even if the signal is eavesdropped, the adversary is still unable to pass the authentication for the next interrogation cycle. This random number based mutual authentication mechanism can in general prevent counterfeiting and repulse attacking Mutual Three-Pass Authentication Protocol The security mechanism for low-cost RFID tags is in general designed with a mutual-authentication protocol so that readers are unable to read tags and distinguish counterfeit tags without having performed a correct authentication (Lopez et al., 2006; Chang, 2005). When the RFID system starts the authentication process, tags are first authenticated by the reader and vice versa before any communication is processed. Mutual authentication processes between the reader and the RFID tag are generally based on the principle of a three-pass mutual authentication, as illustrated in Figure 1. In accordance with ISO 9798 (Weis et al., 2003), both entities in the communication verify the other participant s secret cryptographic key. Three-pass authentication processes are necessary between the reader and the tag to complete a communication cycle, and the tag has the abilities of: (1) having space for secret key storage K AB ; (2) generating random number R A ; (3) encrypting of Token AB and decrypting of Token BA. The potential source of danger is that all the tags possessing an identical cryptographic key K AB could be found easily if there are frequent communications between the reader and the tag Key Diversification The way to further enhance the security of an RFID system based on the three-pass mutual authentication mechanism is to adopt a key diversification scheme (Chang, 2005), as illustrated in Figure 2. In this key diversification based three-pass mutual authentication procedure, the tag is capable of: (1) having space for secret key K S and serial number storage; (2) generating a random number R A ; 190
3 (3) calculating K S ; (4) encrypting Token AB and decrypting Token BA. In this mechanism, a five-pass authentication process is necessary between the reader and the tag to complete a communication cycle. The key diversification scheme uses the tag s serial number and, for security reasons, a secret master key stored on the reader s security access module. This authentication strategy enhances both system security and user privacy by using a secret master key but at the expense of higher costs of the chip. In addition, the time required for completing a communication cycle would be a bit longer, leading to a smaller number of tags read per second. GET_CHALLENGE(R B) Reader Token AB=E KAB(R A R B I) Tag K AB Token BA=E KAB(R A R B) K AB Figure 1. Three-pass mutual authentication procedures between RFID tag and reader. Reader Security Access Module K M GET_Serial Number Serial Number GET_CHALLENGE(R B) Token AB=E KAB(R A RB I) Token BA=E KAB(R A RB) Serial Number Tag K S K S Figure 2. Three-pass mutual authentication procedure based on a key diversification scheme between RFID tag and reader Hash Function An extension of the authentication scheme is to use a cryptographic hash function that offers privacy control at low cost. All it requires is a hash function and space for metalid storage, as shown in Figure 3 (Weis et al., 2003). It is, however, unable to prevent tags from being tracked as the tag s responses are predictable. Thus both the random key and the tag ID could be eavesdropped by an adversary. 191
4 Gao et al. (2004) proposed a hash function based randomized access control mechanism to avoid being tracked, as shown in Figure 4. This authentication mechanism enables the RFID tag to authenticate the reader if the reader is among the authorized group. This is because the readers and the tags belonging to the same group share the same ReaderID. During the authentication processes, tags will not respond to any unauthorized reader. Because the TagID sent by the tag is generated by one-way hash function algorithms, [TagID, h (TagID)] must be stored in a data base beforehand for computing TagID. Figure 3. Hash-Locking: A reader unlocks a hash-locked tag. Query Reader ID API r Reader r Tag Data Base h(readerid r) h(readerid r h(tagid) h(tagid) Figure 4. Hash function based authentication procedure between RFID tag and reader. In this way of authentication, the tag is capable of: (1) generating a random number r; (2) calculating the hash function of h(readerid r) and h(tagid); (3) having space for the ReaderID storage. This authentication mechanism enables tags to identify authorized readers by sending a message of h(tagid) to confirm to the reader every time that an authentication procedure is complete. There still, however, is the possibility of being eavesdropped if an unauthorized tag is able to transmit the same h(tagid) to a reader by eavesdropping h(tagid). Despite the tag generating a random number r for the reader at the beginning to ensure that every time the authentication code provided by the reader is different, there is still a small chance of being eavesdropped due to the fixed and constant message of h(tagid). An unauthorized reader is therefore able to counterfeit the tag by eavesdropping and replaying the message of h(tagid) to the reader. 192
5 3. PROPOSED APPROACH (XOR WITH RANDOM NUMBER SHIFT) The proposed approach for low-cost RFID tags explores the simple XOR algorithm, instead of complex encryption such as using the hash function, for anti-counterfeiting and privacy protection. The key point is to store the ReaderIDs of authorized readers in the tag s memory in advance, so that tags are enabled to identify authorized readers by their ReaderIDs which are stored in both tags and readers. The purpose for using the XOR principle with a function of random number shift is to increase the computing speed as well as to lower the costs of tags. The XOR principle is that if an authorized reader sends a request to the tags for TagID, it will get a series of random numbers (TagID r`) only as r` is unknown, as shown in Figure 5. Figure 5. Proposed authentication schematic diagram. The full procedures of this proposed authentication mechanism based on the XOR principle with the function of random number shift are shown in Figure 6 and described as follows. Step1: The API first generates a random number r followed by inquiring the ReaderID from the data base for the XOR operation and then passes the message of (ReaderID r) to the reader enclosed in a query for broadcasting to the tags. Step2: The tag receives the (ReaderID r) enclosed query and solves the random number r by the XOR logic operation with ReaderID, which is previously stored in the tag s memory. The tag wil then shift r left for n bits (n is the number of binary value 1 of random number r) generating a new random number r`, which will perform the XOR operation with TagID. The message of (TagID r`) will then be transmitted back to the reader, as shown in Figure
6 Step3: The reader passes the message of (TagID r`) to the API, which calculates r` first to obtain TagID by the XOR logic operation of r` with (TagID r`). Query Reader ID API r Reader r Tag Data Base h(readerid r) h(readerid r h(tagid) r` h(tagid) r` Figure 6. XOR encryption algorithm with random number shift. (ReaderID r) Query + (ReaderID r) DB API Reader Tag (TagID r ) (TagID r ) (ReaderID r) r left shifting n bits XOR To Reader r r XOR ReaderID TagID TagID r Figure 7. Illustration of proposed authentication mechanism based on XOR encryption algorithm. In this proposed two-pass authentication mechanism, the tags are capable of: (1) generating random number r` by a few bits shift of r; (2) calculating (TagID r`) by the XOR principle; (3) having space for the ReaderID storage. This authentication mechanism also enables tags to identify authorized readers by sending a message of (TagID r`) to confirm the reader every time the authentication procedures are complete. There is very little chance of being eavesdropped because the information of (TagID r`) transmitted to the reader in the final step is unknown as r` is unknown. 194
7 Comparisons of the proposed approach with the other authentication mechanisms in terms of the encryption algorithm and the number of passes are illustrated in Table 1. Table 1. Encryption algorithm and the number of passes Algorithm Number of passes Tag s capabilities Mutual Three-Pass Generating RN, Encryption of Token AB and decryption 3 times Authentication Protocol of Token BA, Space for secret key and serial number Key Diversification Scheme 5 times Generating RN, Computation of K S, Encryption of Token AB and Decryption of Token BA, Space for secret key and serial number Hash Function Generating RN, Hash function computation, Space for 4 times Encryption ReaderID XOR with RN Shift Generating r (=r left shifting n-bits), TagID r` 2 times calculation, Space for ReaderID Note. *RN: Random Number. 4. SIMULATOR AND SIMULATION RESULTS Due to the lack of real RFID facilities for verification of the proposed security mechanism, we designed a pseudo-reader simulator and a pseudo-tag simulator, as shown in Figures 8 and 9, respectively, for verification. The pseudo-reader simulator is capable of generating a 128-bit random number, Rand128, for the operation of (ReaderID Rand128), sending the signal of (Query ReaderID Rand128) to the tag, and conducting the decryption of (TagID Rand128`) to obtain the TagID. The pseudo-tag simulator is capable of receiving the (ReaderID Rand128) signal enclosed query and solving the random number Rand128 followed by the XOR calculation of (TagID Rand128`). The message of (TagID Rand128`) will then be sent back to the pseudo-reader simulator. The simulation steps are described as follows: Step1: The pseudo-reader simulator reads the ReaderID first from a configuration file and generates the random number Rand128 automatically for the XOR operation with ReaderID, i.e., (ReaderID Rand128), and then encloses it in a query and sends it to the pseudo-tag simulator. Step2: The pseudo-tag simulator triggers the real reader to interrogate the ReaderID stored in the tags memory soon after receiving the message of (Query (ReaderID Rand128). Step3: After receiving the ReaderID, the pseudo-tag simulator is able to obtain the random number Rand128 by the XOR operation of (ReaderID Rand128) with ReaderID. After that Rand128 is shifted left for n bits (n is the number of binary value 1 of random number Rand128) and generates a new random number Rand128`. Step4: After the pseudo-tag simulator generates Rand128`, the reader starts to interrogate TagID from the tags to obtain (TagID Rand128`) by the XOR operation of TagID with Rand128`. This is then transmitted to the pseudo-reader simulator. 195
8 Step5: The pseudo-reader simulator starts the XOR operation of (TagID Rand128`) and Rand128` to obtain the TagID soon after receiving (TagID Rand128`) from the pseudo-tag simulator. Figure 8. The pseudo-reader simulator. Figure 9. The pseudo-tag simulator. The simulation flowcharts are shown in Figures 10(a)-(d). In Figure 10(a), the pseudo-reader simulator, including the data fields of ReaderID, Rand128, and (ReaderID Rand128) placed on the upper left of the figure. The pseudo-tag 196
9 simulator, including ReaderID, Rand128, (ReaderID Rand128), and a red/green light are placed on the upper right of the figure. The upper wave-shaped block in the middle represents the packaged message between the two simulators. The pseudo-tag simulator triggers the reader to interrogate the tag for ReaderID soon after receiving the packaged message of (ReaderID Rand128). The red/green light would turn red before receiving ReaderID, as shown in Figure 10(a), and turn green after receiving ReaderID, which will then be delivered to the data field of ReaderID, and in the mean time Rand128 is sent into the data field of Rand128. Figure 10(b) shows three data fields placed down the right site of the figure, including TagID, Rand128`, (TagID Rand128`), and a red/green light. After Rand128 in the upper data fields is computed, the reader will be triggered to interrogate the tag for TagID. The red/green light would turn red before receiving TagID and turn green after receiving TagID, which will then be delivered to the data field of TagID. The following task is to compute (TagID Rand128`) for Rand128` and deliver the result to the pseudo-reader simulator, as shown in Figure 10(b). Figure 10(c) shows the three data fields of Rand128`, (TagID Rand128`), and TagID placed down the left-hand side. The pseudo-reader simulator would start computing Rand128` and (TagID Rand128`) for TagID once it had received the packaged message of (TagID Rand128`) and then match the TagID to that of the pseudo-tag simulator. A yellow circle would appear if TagID is matched and a red cross appears if not matched, as shown in Figure 10(c). But a red N would appear if the real reader fails to interrogate real tags as shown in Figure 10(d). 5. DISCUSSION According to Table 1, the proposed authentication mechanism shows some advantages in comparison with that of others, including (a) a relatively simple algorithm (XOR), (b) a simpler algorithm leading to a smaller number of logic gates required and thus reducing cost, (c) high security (random number shift), and (d) high efficiency (two-passes only). For better performance testing of our approach, we plan to verify the proposed design by designing a simple circuit that will integrate a shift register with a random number generator, XOR logic gates, antenna, and memory. Thus, posible efects of noise and/or disturbance, from the reading range and the non-uniformity of the antenna for signal coupling will be clearer. For such a purpose, we have done the first step of designing a novel NMOS-type shift register which contains a relatively small number of transistors per stage, as shown in Figure 11 (Jone, Aliso, & Chen, 2002) that is expected to reduce the tags price by reducing the manufacturing processes. The challenges faced by low-cost RFID design actually not only lie in the number of logic gates but also in the regulation and power consumption of circuits (Ranasinghe, Lim, Cole, & Devadas, 2006), which will also be our future work. 197
10 (a) (b) Figure 10. RFID authentication simulator and flowchart. 198
11 (c) (d) Figure 10 (continued). RFID authentication simulator and flowchart. 199
12 Figure 11. NMOS-type shift register. REFERENCES Chang, G. C. (2005). A Feasible Security Mechanism for Low Cost RFID Tags. The Fourth International Conference on Mobile Business (ICMB 05), Sydney, Australia, Dimitriou, T. (2005). A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, ISBN: Finkenzeller, K. (2003). RFID Handbook: Fundamentals and Applicatons in Contactless Smart Cards and Identification (2nd ed.). Munich, Germany: Wiley. Garfinkel, S., & Rosenberg, B. (2005). RFID Applications, Security, and Privacy. Boston, USA: Addison-Wesley. Gao, X., Xiang, Z., Wang, H., Shen, J., Huang, J. & Song, S. (2004). An Approach to security and privacy of RFID system for supply chain. Proceedings of IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC04EAST), Beijing, China, Henrici, D., & Muller, P. (2004). Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. Proceedings of Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04), Washington, DC, USA, Jone, L. M., Aliso, B., & Chen, Y. C. (2002). Bootstrapped Shift Register. World Intellectual Property Organization, WO 02/45091 A1. Kim, H. S., Oh, J. H., Choi, J. Y. & Kim, J. W. (2006). The Vulnerabilities Analysis and Design of the Security Protocol for RFID System. Proceedings of 200
13 Sixth IEEE International Conference on Computer and Information Technology (CIT 06), Seoul, Korea, 152. Lopez, P. P., Castro, J. C. H., Tapiador, J. M. E., & Ribagordaj, A. (2006). An Efficient Mutual - Authentication Protocol for Low-cost RFID Tags. Retrieved May 14, 2006, from /papers /PerisHER-2006-otm-is.pdf Li, Y. Z., Jeong, Y. S., Sun, N., & Lee, S. H. (2006). Low-cost Authentication Protocol of the RFID System Using Partial ID. Proceedings of International Conference on Computational Intelligence and Security, Guangzhou, China, Oertel, B., Wolk, M., Hilyt, L., & Kohler, A. (2005). Security Aspects and Prospective Applications of RFID Systems (BSI Report), Bonn, Germany: German Federal Office for Information Security (BSI). Ranasinghe, D. C., Engels, D. W., & Cole, P. H. (2005). Low-Cost RFID Systems: Confronting Security and Privacy. USA Auto-ID Labs. White Paper WP-SWNET-013. Ranasinghe, D. C., Lim, D., Cole, P. H., & Devadas, S. (2006). A Low Cost Solution to Authentication in Passive RFID Systems. USA Auto-ID Labs. White Paper WP-HARDWARE-029. Srivastava, L. (2005). Ubiquitous Network Societies: The Case of Radio Frequency Identification, Background Paper. Internation Telecommunication Union (ITU) New Initiatives Workshop on Ubiquitous Network Societies, Geneva, Switzerland. Retrieved from /RFID background paper.pdf Shepard, S. (2005). RFID: Radio Frequency Identification. New York, USA: Mc Graw Hill. Weis, S. A., Sarma, S. E., & Rivest, R. L. (2003). Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Proceedings of First International Conference on Security in Pervasive Computing. Yang, J., Park, J., Lee, H., Ren, K., & Kim, K. (2005). Mutual Authentication Protocol for Low-Cost RFID. Workshop on RFID and Lightweight Crypto, Graz, Austria. Yang, J., Ren, K., & Kim, K. (2005). Security and Privacy on Authentication Protocol for Low-Cost RFID. The 2005 Symposium on Cryptography and Information Security, Maiko, Kobe, Japan. Zhang, L., & Zhou, H. (2005). An Improved Approach to Security and Privacy of RFID Application System. Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WCNM2005), Wuhan, China. 201
14 Yung-Chin Chen received his B. S. degree in Physics from Tamkang University in 1988, and his first M.S. degree in Opto-electronics engineering from National Chiao Tung University in Dr. Chen served at Telecommunication Laboratories of Chunghwa Telecom Co., Ltd. in Jung-Li, Taiwan as an assistant R&D engineer in 1991 and served at Sinonar Co., Ltd. in Hsinchu, Taiwan as an R&D engineer in Dr. Chen received a second M.S degree in electrical engineer from University College, London in 1996, and a Ph.D. degree in electrical engineering from Imperial College London in Dr. Chen served at Wintek Co., Ltd. in Taichung, Taiwan as an R&D engineer in 2000 and joined the faculty of Asia University in Taiwan in November 2003, and is currently an assistant Professor in the Department of Computer and Communication Engineering. Professor Chen s major research interests include TFT-LCD, RFID, and flexible electronics. So far he has published more than 20 academic papers and two international patents. Dr. Chen is currently a member of IEEE. Wei-Lin Wang received his B.S. degree in information technology from Toko University, Chiayi, Taiwan in 2004, and an M.S. degree in computer and communication from Asia University, Taichung, Taiwan in Mr. Wang has served at Lee Ching Tech Co., Ltd in Taichung, Taiwan as a research engineer since July His current research interests include RFID middleware software and authentication protocols. Min-Shiang Hwang was born on August 27, 1960 in Tainan, Taiwan, Republic of China (ROC). He received his B.S. in electronic engineering from National Taipei Institute of Technology, Taipei, Taiwan, ROC, in 1980; an M.S. in industrial engineering from National Tsing Hua University, Taiwan, in 1988; and the Ph.D. in computer and information Science from National Chiao Tung University, Taiwan, in He also studied applied mathematics at National Cheng Kung University, Taiwan, from Dr. Hwang passed the National Higher Examination in the field of electronic engineer in He also passed the National Telecommunication Special Examination in the field of 202
15 information engineering, qualified as an advanced technician first class in From 1988 to 1991, he was the leader of the Computer Center at Telecommunication Laboratories (TL), Ministry of Transportation and Communications, ROC. He was also the Chairman of the Department of Information Management, Chaoyang University of Technology (CYUT), Taiwan, from He was a professor and the Chairman of the Graduate Institute of Networking and Communications, CYUT, from He is currently a professor of the department of Management Information System, National Chung Hsing University, Taiwan, ROC. He obtained 1997, 1998, 1999, 2000, and 2001 Outstanding Research Awards of the National Science Council of the Republic of China. He is a member of IEEE, ACM, and the Chinese Information Security Association. His current research interests include electronic commerce, database and data security, cryptography, image compression, and mobile computing. Dr. Hwang has published 100 articles on the above research fields in international journals. 203
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
On the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Back-end Server Reader Tag
A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
Third 2008 International Conference on Convergence and Hybrid Information Technology A Survey of RFID Authentication Protocols Based on Hash-Chain Method Irfan Syamsuddin a, Tharam Dillon b, Elizabeth
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Tackling Security and Privacy Issues in Radio Frequency Identification Devices
Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
The Study on RFID Security Method for Entrance Guard System
The Study on RFID Security Method for Entrance Guard System Y.C. Hung 1, C.W. Tsai 2, C.H. Hong 3 1 [email protected] 2 [email protected] 3 [email protected] Abstract: The RFID technology
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Security Issues in RFID. Kai Wang Research Institute of Information Technology, Tsinghua University, Beijing, China [email protected].
Security Issues in RFID Kai Wang Research Institute of Information Technology, Tsinghua University, Beijing, China [email protected] Abstract RFID (Radio Frequency IDentification) are one
PAP: A Privacy and Authentication Protocol for Passive RFID Tags
PAP: A Privacy and Authentication Protocol for Passive RFID s Alex X. Liu LeRoy A. Bailey Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824-1266, U.S.A. {alexliu,
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Scalable RFID Security Protocols supporting Tag Ownership Transfer
Scalable RFID Security Protocols supporting Tag Ownership Transfer Boyeon Song a,1, Chris J. Mitchell a,1 a Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols Ehsan Vahedi, Rabab K. Ward and Ian F. Blake Department of Electrical and Computer Engineering The University of British
A. Background. In this Communication we can read:
On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Department of Information Management
Department of Information Management Introduction History Department of Information Management of Yuanpei University was accredited by the Ministry of Education in 000. After that, a graduate program (Master
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
An Overview of Approaches to Privacy Protection in RFID
An Overview of Approaches to Privacy Protection in RFID Jimmy Kjällman Helsinki University of Technology [email protected] Abstract Radio Frequency Identification (RFID) is a common term for technologies
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
Feature. Security and Privacy Trade-offs in RFID Use. Operational Zone RFID Tag. RFID Reader
Feature Security and Privacy Trade-offs in RFID Use S. Srinivasan is a professor of computer information systems at the University of Louisville in Kentucky, USA. He can be reached at [email protected].
A Research on Issues Related to RFID Security and Privacy
A Research on Issues Related to RFID Security and Privacy Jongki Kim1, Chao Yang2, Jinhwan Jeon3 1 Division of Business Administration, College of Business, Pusan National University 30, GeumJeong-Gu,
A Secure and Efficient Authentication Protocol for Mobile RFID Systems
A Secure and Efficient Authentication Protocol for Mobile RFID Systems M.Sandhya 1, T.R.Rangaswamy 2 1 Assistant Professor (Senior Lecturer) CSE Department B.S.A.Crescent Engineering College Chennai, India
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
RESEARCH SURVEY ON MIFARE WITH RFID TECHNOLOGY
RESEARCH SURVEY ON MIFARE WITH RFID TECHNOLOGY S.SRINIVASAN Assistant Professor, School of Computing, SASTRA University, Kumbakonam-612001 Tamil Nadu, India [email protected] Dr. C. CHANDRASEKAR
An Overview of RFID Security and Privacy threats
An Overview of RFID Security and Privacy threats Maxim Kharlamov [email protected] The University of Auckland October 2007 Abstract Radio Frequency Identification (RFID) technology is quickly deploying
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
Research Article Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud
International Journal of Distributed Sensor Networks Article ID 937198 Research Article Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud Qingkuan Dong, Jiaqing
Evaluating RFID Research a Literature Review
Evaluating RFID Research a Literature Review Franklin T. Warren Business Information Technology Virginia Polytechnic Institute and State University Fall 2007 A Paper in Partial Fulfillment of the requirements
Various Attacks and their Countermeasure on all Layers of RFID System
Various Attacks and their Countermeasure on all Layers of RFID System Gursewak Singh, Rajveer Kaur, Himanshu Sharma Abstract RFID (radio frequency identification) system is one of the most widely used
Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service
, pp. 195-204 http://dx.doi.org/10.14257/ijsh.2015.9.5.19 Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service Ju-Su Kim, Hak-Jun
Introduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
Efficient Nonce-based Authentication Scheme for. session initiation protocol
International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department
Optimal Library Inventory System Using EMID Technology. [email protected]
Optimal Library Inventory System Using EMID Technology Sung-Tsun Shih 1, Chin-Ming Hsu 2, Chian-Yi Chao 3 1 Department of Electronic Engineering, Cheng Shiu University, Kaohsiung, Taiwan 2 Department of
Chia-Yen Lee ( 李 家 岩 )
Chia-Yen Lee ( 李 家 岩 ) Assistant Professor Institute of Manufacturing Information and Systems National Cheng Kung University, Taiwan No.1, University Road, Email: [email protected] Tainan City 701,
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title
RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Significance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
Design for Management Information System Based on Internet of Things
Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, [email protected] Abstract
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Intelligent Fleet Management System Using Active RFID
Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
Secure Active RFID Tag System
Secure Active RFID Tag System Isamu Yamada 1, Shinichi Shiotsu 1, Akira Itasaki 2, Satoshi Inano 1, Kouichi Yasaki 2, and Masahiko Takenaka 2 1 Fujitsu Laboratories Ltd. 64 Nishiwaki, Ohkubo-cho, Akashi
Improving the Efficiency of RFID Authentication with Pre-Computation
Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Melbourne, Australia Improving the Efficiency of RFID Authentication with Pre-Computation Kaleb Lee Juan Manuel González
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
International Journal of Network Security, Vol.18, No.1, PP.133-142, Jan. 2016 133 A Survey of Public Auditing for Secure Data Storage in Cloud Computing Wei-Fu Hsien 1, Chou-Chen Yang 1, and Min-Shiang
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
CHARGE pumps are the circuits that used to generate dc
INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR CIRCUITS AND SYSTEMS, VOL. 1, NO. 1, JUNE 2011 27 A Charge Pump Circuit by using Voltage-Doubler as Clock Scheme Wen Chang Huang, Jin Chang Cheng,
A Strong RSA-based and Certificateless-based Signature Scheme
International Journal of Network Security, Vol.18, No.2, PP.201-208, Mar. 2016 201 A Strong RSA-based and Certificateless-based Signature Scheme Chin-Chen Chang 1,2, Chin-Yu Sun 3, and Shih-Chang Chang
RFID Security and Privacy: Threats and Countermeasures
RFID Security and Privacy: Threats and Countermeasures Marco Spruit Wouter Wester Technical Report UU-CS- 2013-001 January 2013 Department of Information and Computing Sciences Utrecht University, Utrecht,
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
An Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
The Research and Application of College Student Attendance System based on RFID Technology
The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,
Analytical Model for Automating Purchases using RFID-enabled Shelf and Cart
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 537-544 International Research Publications House http://www. irphouse.com /ijict.htm Analytical
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Secure and Serverless RFID Authentication and Search Protocols
Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li {cct,shengbo,liqun}@cs.wm.edu Department of Computer Science College of William and Mary Abstract With the
Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID
Journal of Information Hiding and Multimedia Signal Processing c 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 4, October 2014 Pitfalls in an ECC-based Lightweight Authentication Protocol
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Network security and privacy
Summer semester 2013 Seminar on Network security and privacy (selected topics) Prof. Dr. Dieter Hogrefe Sviatoslav Edelev Maimun Rizal Hang Zhang 19.04.2013 1 Course Overview Prerequisites (Recommended):
