protecting your privacy with a mobile agent device in rfid environment n.
Skip this Video
Loading SlideShow in 5 Seconds..
Protecting Your Privacy with a Mobile Agent Device in RFID Environment PowerPoint Presentation
Download Presentation
Protecting Your Privacy with a Mobile Agent Device in RFID Environment

play fullscreen
1 / 15
Download Presentation

Protecting Your Privacy with a Mobile Agent Device in RFID Environment - PowerPoint PPT Presentation

pavel
124 Views
Download Presentation

Protecting Your Privacy with a Mobile Agent Device in RFID Environment

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, vol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31

  2. Outline • The Problem • MARP • eMARP • Security and efficiency analysis • Conclusion • Comments

  3. The Problem • An attacker can eavesdrop the tag’s PIN. (mode change key of the tag t) • There are many readers and agents in system, it will decrease overall performance of MARP scheme.

  4. MARP

  5. MARP-Initial setup phase

  6. MARP- Privacy protection phase (Tag sleep mode)

  7. MARP- Authentication phase (Tag wake mode )

  8. MARP-Main scheme

  9. eMARP

  10. eMARP- Registration phase

  11. eMARP- Agent working phase

  12. Security and efficiency analysis • Eavesdropping • One-way hash function and self refreshed PINt • Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping • Spoofing attack • Only authenticated reader or agent , who know secret PIN of the tag • Location tracking • Tag forgery

  13. Comments • The problem is solved • An attacker can eavesdrop the tag’s PIN. • There are many readers and agents in system, it will decrease overall performance of MARP scheme.

  14. Comments (cont.) • Advantage • This paper integrate mobile agent and public-key center to replace the disadvantage that the efficiency of the tag is not enough and security. • Disadvantage • eMARP cannot resist Spoofing attack • eMARP cannot resist Location tracking

  15. h(PINt)1♁h(Keyt) ♁ h(PINt)2♁h(Keyt) =h(PINt)1♁h(PINt)2 h(PINt)1♁h(PINt)2 ♁h(PINt)2 =h(PINt)1 h(PINt)1 ♁h(PINt)1♁h(Keyt) =h(Keyt)………Registration phase h(Keyt) ♁Rs ♁ h(Keyt) = Rs