An implementation of a unified security, trust and privacy (STP) framework for future integrated RFID system

被引:0
作者
Mubarak, Mohd Faizal [1 ,2 ]
Ab Manan, Jamalul-Lail [3 ]
Yahya, Saadiah [1 ]
机构
[1] Universiti Teknologi MARA Malaysia, Shah Alam, 40450, Selangor
[2] Information Communication Technologies (ICT) Division, Technology Park Malaysia, MIMOS Bhd, Kuala Lumpur
[3] Strategic Advanced Research Cluster (STAR), Technology Park Malaysia, MIMOS Bhd, Kuala Lumpur
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014年 / 8860卷
关键词
Cryptography - Trusted computing;
D O I
10.1007/978-3-319-12778-1_10
中图分类号
学科分类号
摘要
Previous and existing RFID systems with security protection have discussed the solution in term of security, trust and privacy in silo. Moreover, security and privacy solutions protect secret data and provide anonymity services for RFID system. Unfortunately, both solutions are not used to verify integrity of the integrated and interconnected platforms. RFID platform without any system integrity verification could be hijacked and adversary could use the infected platform to attack other integrated platforms. This research aims at designing RFID system with a combination approach of security, trust and privacy. The unified combination of security and privacy with trust in this solution compliments each other because integrity report is encrypted by using lightweight-based encryption, encryption key is sealed by using a sealing key of the trusted platform module, and identity of every platform is anonymous and protected by using an anonymizer. This paper presents an implementation of a framework which emulates the real hardware prototype system for RFID with security, trust and privacy. © Springer International Publishing Switzerland 2014.
引用
收藏
页码:122 / 135
页数:13
相关论文
共 41 条
[11]  
Byres E., Franz M., Miller D., The use of attack trees in assessing vulnerabilities in SCADA systems, Proceedings of the International Infrastructure Survivability Workshop, (2004)
[12]  
Hentea M., A perspective on security risk management of SCADA control systems, Proceedings of ISCA 23rd International Conference on Computers and their Applications, CATA 2008, pp. 222-227, (2008)
[13]  
Hein D., Wolkerstorfer J., Felber N., ECC is Ready for RFID – A Proof in Silicon, Conference on RFID Security, (2008)
[14]  
Hermans J., Lightweight Public Key Cryptography (Dortoral dissertation, PhD thesis, Katholieke Universiteit Leuven, (2012)
[15]  
Feldhofer M., Dominikus S., Wolkerstorfer J., Strong Authentication for RFID Systems Using the AES Algorithm, CHES 2004. LNCS, 3156, pp. 357-370, (2004)
[16]  
Deng G., Li H., Zhang Y., Wang J., Tree-LSHB+: An LPN-Based Lightweight Mutual Authetication RFID Protocol, Wireless Personal Communications, pp. 1-16, (2013)
[17]  
El Moustaine E., Laurent M., GPS+: A back-end coupons identification for low-cost RFID, Proceedings of the sixth ACM Conference on Security and Privacy in wireless and Mobile Networks, pp. 73-78, (2013)
[18]  
(2007)
[19]  
(2007)
[20]  
Sadeghi A.R., Visconti I., Wachsmann C., Anonymizer-enabled Security and Privacy for RFID, CANS 2009. LNCS, 5888, pp. 134-153, (2009)