An implementation of a unified security, trust and privacy (STP) framework for future integrated RFID system

被引:0
作者
Mubarak, Mohd Faizal [1 ,2 ]
Ab Manan, Jamalul-Lail [3 ]
Yahya, Saadiah [1 ]
机构
[1] Universiti Teknologi MARA Malaysia, Shah Alam, 40450, Selangor
[2] Information Communication Technologies (ICT) Division, Technology Park Malaysia, MIMOS Bhd, Kuala Lumpur
[3] Strategic Advanced Research Cluster (STAR), Technology Park Malaysia, MIMOS Bhd, Kuala Lumpur
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014年 / 8860卷
关键词
Cryptography - Trusted computing;
D O I
10.1007/978-3-319-12778-1_10
中图分类号
学科分类号
摘要
Previous and existing RFID systems with security protection have discussed the solution in term of security, trust and privacy in silo. Moreover, security and privacy solutions protect secret data and provide anonymity services for RFID system. Unfortunately, both solutions are not used to verify integrity of the integrated and interconnected platforms. RFID platform without any system integrity verification could be hijacked and adversary could use the infected platform to attack other integrated platforms. This research aims at designing RFID system with a combination approach of security, trust and privacy. The unified combination of security and privacy with trust in this solution compliments each other because integrity report is encrypted by using lightweight-based encryption, encryption key is sealed by using a sealing key of the trusted platform module, and identity of every platform is anonymous and protected by using an anonymizer. This paper presents an implementation of a framework which emulates the real hardware prototype system for RFID with security, trust and privacy. © Springer International Publishing Switzerland 2014.
引用
收藏
页码:122 / 135
页数:13
相关论文
共 41 条
[1]  
Sarma S.E., Weis S.A., Engels D.W., RFID systems and security and privacy implications, CHES 2002. LNCS, 2523, pp. 454-469, (2003)
[2]  
Dietrich K., Anonymous RFID authentication using trusted computing technologies, RFIDSec 2010. LNCS, 6370, pp. 91-102, (2010)
[3]  
Kumar A., Arora A., Islam C.J., Near Field Communication(NFC): An expertise primer, Discovery, 2, 4, pp. 20-25, (2012)
[4]  
Dardari D., D'Errico R., Roblin C., Sibille A., Win M.Z., Ultrawide bandwidth RFID: The next generation?, Proceedings of the IEEE, 98, 9, pp. 1570-1582, (2010)
[5]  
Zou Z., Baghaei-Nejad M., Tenhunen H., Zheng L.R., An efficient passive RFID system for ubiquitous identification and sensing using impulse UWB radio. e & I Elektrotechnik und Informationstechnik, 124, 11, pp. 397-403, (2007)
[6]  
Grunwald L., New attacks against RFID-systems, (2006)
[7]  
Rieback M.R., Simpson P.N., Crispo B., Tanenbaum A.S., RFID Malware: Design principles and examples, Pervasive and Mobile Computing, 2, 4, pp. 405-426, (2006)
[8]  
Shankarapani M.K., Sulaiman A., Mukkamala S., Fragmented malware through RFID and its defenses, Journal in Computing Virology, 5, 3, pp. 187-198, (2009)
[9]  
Armstrong H.L., Forde P.J., Internet anonymity practice in computer crime, Information Management and Computer Security, 11, 5, pp. 209-215, (2003)
[10]  
Barber R., Hacking techniques: The tools that hackers use, and how they are evolving to become more sophisticated, Computer Fraud & Security, 2001, 3, pp. 9-12, (2001)