1 / 12

Enhancing RFID Security and Privacy through Proxy Framework

This paper presents a novel proxy framework designed to improve security and privacy in RFID systems. Emphasizing user control, the system allows users to determine when and where their information is released. Key design goals include protecting against tag spoofing and impersonation attacks, enforcing policies, and facilitating tag transferability. The proxy operations detailed in this study optimize RFID interactions while ensuring user autonomy, ultimately enhancing overall system security. Findings demonstrate that the framework empowers users while maintaining efficient operation and simplicity.

dulcea
Download Presentation

Enhancing RFID Security and Privacy through Proxy Framework

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Proxy Framework for Enhanced RFID Security and Privacy Authors: Tassos Dimitriou Source: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE,10-12 Jan. 2008 Page(s):843 - 847 Speaker: Chia-Min Lin

  2. Outline • Introduction • Design Goals • Proxy Operations • Conclusions • Comment

  3. Introduction • User can specify when and where information will be released • Tag can transfer it to another user

  4. Design Goals(1/2) • Privacy • Protection against tag spoofing or cloning • Protection against impersonation attacks

  5. Design Goals(2/2) • Policy enforcement and access control • Transferability and tag release • Simplicity and Efficiency

  6. Proxy Operations(1/5) Rewrite Request , NR TAG Proxy NT⊕FCID(NR), FCID(NT) NewID⊕FCID(NR, NT ), FCID(NewID, K, NR, NT ) • FK(M):psedo-random function applied on a message M • N:a random number used once

  7. Proxy Operations(2/5) • Enhancing RFID privacy CID = TrueID Scan Request; NR TAG Reader NT ; TrueID⊕FCID(NR,NT ); FCID(TrueID , K, NR, NT )

  8. Proxy Operations(3/5) • Putting a tag to sleep Sleep Request TAG Proxy NT FCID(K ,”Sleep”, NT )

  9. Proxy Operations(4/5) • Awaking a tag Wake-up Request TAG Proxy NT FCID(K ,” Wake-up”, NT )

  10. Proxy Operations(5/5) • Bringing a tag back to its original state ReleaseRequest TAG Proxy NT FCID(K, “Revert“, NT )

  11. Conclusions • User has full control of the tags • The tag can be transferred to other users

  12. Comment • Tag can make use of proxy to do the encryption which need a large amount of operation

More Related