120 likes | 242 Views
This paper presents a novel proxy framework designed to improve security and privacy in RFID systems. Emphasizing user control, the system allows users to determine when and where their information is released. Key design goals include protecting against tag spoofing and impersonation attacks, enforcing policies, and facilitating tag transferability. The proxy operations detailed in this study optimize RFID interactions while ensuring user autonomy, ultimately enhancing overall system security. Findings demonstrate that the framework empowers users while maintaining efficient operation and simplicity.
E N D
Proxy Framework for Enhanced RFID Security and Privacy Authors: Tassos Dimitriou Source: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE,10-12 Jan. 2008 Page(s):843 - 847 Speaker: Chia-Min Lin
Outline • Introduction • Design Goals • Proxy Operations • Conclusions • Comment
Introduction • User can specify when and where information will be released • Tag can transfer it to another user
Design Goals(1/2) • Privacy • Protection against tag spoofing or cloning • Protection against impersonation attacks
Design Goals(2/2) • Policy enforcement and access control • Transferability and tag release • Simplicity and Efficiency
Proxy Operations(1/5) Rewrite Request , NR TAG Proxy NT⊕FCID(NR), FCID(NT) NewID⊕FCID(NR, NT ), FCID(NewID, K, NR, NT ) • FK(M):psedo-random function applied on a message M • N:a random number used once
Proxy Operations(2/5) • Enhancing RFID privacy CID = TrueID Scan Request; NR TAG Reader NT ; TrueID⊕FCID(NR,NT ); FCID(TrueID , K, NR, NT )
Proxy Operations(3/5) • Putting a tag to sleep Sleep Request TAG Proxy NT FCID(K ,”Sleep”, NT )
Proxy Operations(4/5) • Awaking a tag Wake-up Request TAG Proxy NT FCID(K ,” Wake-up”, NT )
Proxy Operations(5/5) • Bringing a tag back to its original state ReleaseRequest TAG Proxy NT FCID(K, “Revert“, NT )
Conclusions • User has full control of the tags • The tag can be transferred to other users
Comment • Tag can make use of proxy to do the encryption which need a large amount of operation