1 / 15

Protecting Your Privacy with a Mobile Agent Device in RFID Environment

Protecting Your Privacy with a Mobile Agent Device in RFID Environment. Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, vol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31.

pavel
Download Presentation

Protecting Your Privacy with a Mobile Agent Device in RFID Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, vol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31

  2. Outline • The Problem • MARP • eMARP • Security and efficiency analysis • Conclusion • Comments

  3. The Problem • An attacker can eavesdrop the tag’s PIN. (mode change key of the tag t) • There are many readers and agents in system, it will decrease overall performance of MARP scheme.

  4. MARP

  5. MARP-Initial setup phase

  6. MARP- Privacy protection phase (Tag sleep mode)

  7. MARP- Authentication phase (Tag wake mode )

  8. MARP-Main scheme

  9. eMARP

  10. eMARP- Registration phase

  11. eMARP- Agent working phase

  12. Security and efficiency analysis • Eavesdropping • One-way hash function and self refreshed PINt • Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping • Spoofing attack • Only authenticated reader or agent , who know secret PIN of the tag • Location tracking • Tag forgery

  13. Comments • The problem is solved • An attacker can eavesdrop the tag’s PIN. • There are many readers and agents in system, it will decrease overall performance of MARP scheme.

  14. Comments (cont.) • Advantage • This paper integrate mobile agent and public-key center to replace the disadvantage that the efficiency of the tag is not enough and security. • Disadvantage • eMARP cannot resist Spoofing attack • eMARP cannot resist Location tracking

  15. h(PINt)1♁h(Keyt) ♁ h(PINt)2♁h(Keyt) =h(PINt)1♁h(PINt)2 h(PINt)1♁h(PINt)2 ♁h(PINt)2 =h(PINt)1 h(PINt)1 ♁h(PINt)1♁h(Keyt) =h(Keyt)………Registration phase h(Keyt) ♁Rs ♁ h(Keyt) = Rs

More Related