An anti-counterfeiting RFID privacy protection protocol

被引:8
作者
Zhang, Xiaolan [1 ]
King, Brian
机构
[1] Univ Illinois, Dept Elect & Comp Engn, Chicago, IL 60680 USA
[2] Indiana Univ Purdue Univ, Dept Elect & Comp Engn, Indianapolis, IN 46202 USA
关键词
RFID security; integrity; privacy;
D O I
10.1007/s11390-007-9059-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The privacy problem of many RFID systems has been extensively studied. Yet integrity in RFID has not received much attention as regular computer systems. When we evaluate an identification protocol for an RFID system for anti-counterfeiting, it is important to consider integrity issues. Moreover, many RFID, systems are accessed by multiple level trust parties, which makes comprehensive integrity protection even harder. In this paper, we first propose an integrity model for RFID protocols. Then we use the model to analyze the integrity problems in Squealing Euros protocol. Squealing Euros was proposed by Juels and Pappu for RFID enabled banknotes that will support anti-forgery and lawful tracing yet preserve individual's privacy. We analyze its integrity, we then discuss the problems that arise and propose some solutions to these problems. Then an improved protocol with integrity protection for the law enforcement is constructed, which includes an unforgeable binding between the banknote serial number and the RF ciphertext only readable to law enforcement. This same protocol can be applied in many other applications which require a privacy protecting anti-counterfeiting mechanism.
引用
收藏
页码:438 / 448
页数:11
相关论文
共 29 条
[1]  
[Anonymous], 2005, P 4 ACM WORKSHOP WIR, DOI DOI 10.1145/1080793.1080805
[2]  
[Anonymous], NY TIMES
[3]  
[Anonymous], 2003, RFID J
[4]  
*ATM CORP, 2003, ATM T5552 DAT SHEET
[5]  
*ATM CORP, 2003, ATM E5561 DAT SHEET
[6]  
*ATM CORP, 2003, ATM T5557 DAT SHEET
[7]  
*AUT ID CTR, 2002, MITAUTOIDTR007
[8]  
Avoine G, 2005, LECT NOTES COMPUT SC, V3570, P125
[9]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[10]  
Avoine G, 2004, INT FED INFO PROC, V153, P33