Keeping It Under Control: A New Authentication Scheme for RFID Tags

被引:0
作者
Li, Tongliang [1 ,2 ]
Jin, Zhigang [1 ]
Yang, Hongguang [2 ,3 ]
Si, Xiaokun [2 ,3 ]
机构
[1] Tianjin Univ, Tianjin 300072, Peoples R China
[2] Hebei Inst Appl Math, Shijiazhuang, Peoples R China
[3] SJZ JKSS Technol Co Ltd, Shijiazhuang, Peoples R China
来源
2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM) | 2010年
关键词
RFID; ownership transfer; security; privacy; mutual authentication; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasingly used Radio Frequency Identification (RFID) systems are facing with the security and privacy concerns for the illegitimate reading and potential tracking reason. Many schemes have been proposed by using of cryptographic technology, while they are lacking the people's involvement. In this paper, we propose a new crypto-based scheme that makes users involved in the tag's authentication process by using of physical privacy type assistant tags. Before identifying common tags, the reader needs to get some data from the assistant tags first. The data make the shared secret between the tag and the back-end database different. It not only keeps the tag can be read or not under user's control, but also makes the scheme safer even if the data on back-end database is revealed. Light weight block ciphers or hash functions can be employed in our scheme; a contrast of the performance is also given after the security and privacy analysis.
引用
收藏
页数:5
相关论文
共 15 条
[11]  
Ohkubo M., 2004, S CRYPTOGRAPHY INFOR, V1, P719
[12]  
SARMA SE, 2002, 4 INT WORKSH CRYPT H, P454
[13]  
Singelee D., 2009, USER PRIVACY RFID NE
[14]  
Song BY, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P140
[15]  
Weis StephenA., 2003, Security and privacy aspects of low-cost radio frequency identification systems, P201