1 / 12

Proxy Framework for Enhanced RFID Security and Privacy

Proxy Framework for Enhanced RFID Security and Privacy. Authors: Tassos Dimitriou Source: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE,10-12 Jan. 2008 Page(s):843 - 847 Speaker: Chia-Min Lin. Outline. Introduction Design Goals Proxy Operations Conclusions

dulcea
Download Presentation

Proxy Framework for Enhanced RFID Security and Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Proxy Framework for Enhanced RFID Security and Privacy Authors: Tassos Dimitriou Source: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE,10-12 Jan. 2008 Page(s):843 - 847 Speaker: Chia-Min Lin

  2. Outline • Introduction • Design Goals • Proxy Operations • Conclusions • Comment

  3. Introduction • User can specify when and where information will be released • Tag can transfer it to another user

  4. Design Goals(1/2) • Privacy • Protection against tag spoofing or cloning • Protection against impersonation attacks

  5. Design Goals(2/2) • Policy enforcement and access control • Transferability and tag release • Simplicity and Efficiency

  6. Proxy Operations(1/5) Rewrite Request , NR TAG Proxy NT⊕FCID(NR), FCID(NT) NewID⊕FCID(NR, NT ), FCID(NewID, K, NR, NT ) • FK(M):psedo-random function applied on a message M • N:a random number used once

  7. Proxy Operations(2/5) • Enhancing RFID privacy CID = TrueID Scan Request; NR TAG Reader NT ; TrueID⊕FCID(NR,NT ); FCID(TrueID , K, NR, NT )

  8. Proxy Operations(3/5) • Putting a tag to sleep Sleep Request TAG Proxy NT FCID(K ,”Sleep”, NT )

  9. Proxy Operations(4/5) • Awaking a tag Wake-up Request TAG Proxy NT FCID(K ,” Wake-up”, NT )

  10. Proxy Operations(5/5) • Bringing a tag back to its original state ReleaseRequest TAG Proxy NT FCID(K, “Revert“, NT )

  11. Conclusions • User has full control of the tags • The tag can be transferred to other users

  12. Comment • Tag can make use of proxy to do the encryption which need a large amount of operation

More Related