1 / 17

Secure and Serverless RFID Authentication and Search Protocols

Secure and Serverless RFID Authentication and Search Protocols. Authors: Chiu C. Tan, Bo Sheng, and Qun Li Sources: IEEE Transaction on Wireless Communication, vol. 7, no. 4, pp. 1400-1407, 2008 Speaker: C. H. Wei Date: 2009.10.1. Outline. The problem Authentication protocol

perry
Download Presentation

Secure and Serverless RFID Authentication and Search Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure and Serverless RFID Authentication and Search Protocols Authors: Chiu C. Tan, Bo Sheng, and Qun Li Sources: IEEE Transaction on Wireless Communication, vol. 7, no. 4, pp. 1400-1407, 2008 Speaker: C. H. Wei Date: 2009.10.1

  2. Outline • The problem • Authentication protocol • Secure search protocol • Conclusion • Comments

  3. The Problem • Traditional RFID System is based on Central database. • It is not useful in other scenario • The truck driver is unable to connect with the central database to authenticate the goods • Serverless(無主機) RFID

  4. CA (Certificate Authority) Secure channel Insecure channel Reader Tag

  5. Authentication Protocol

  6. Security Analysis • Basic Privacy • Assume that adversary has a list of targeted RFID tags • Tag generates a new response at each time • Adversary cannot identify which RFID tag is on his list • Tracking • Adversary cannot predict the random nj generated each time

  7. Security Analysis (cont.) • Cloning • Adversary want to replace a fake RFID tag • Adversary cannot predict ni • Eavesdropping • Adversary learns ri, ni, nj, • Adversary does not know ;therefore, it cannot derive the correct hash result

  8. Security Analysis (cont.) • Physical attack • Adversary compromises the reader • Attacker know the contents of Li • The goal is to prevent attacker counterfeit tag that can fool another reader • Adversary compromises the Tag • Attacker know any information that reader passes to tag • The goal is to prevent attacker creating another tag that can fool reader

  9. Security Analysis (cont.) • Denial of Service (DoS) • Adversary sends a large number of requests to the backend server to overwhelm the server. • Reader only needs to contact the server once to obtain an access list.

  10. Secure search protocol • A pharmacist wanting to find a particular drug can broadcast his query and receive an answer

  11. Search protocol improvement Ⅰ • To force the reader use a different random number nr for each new query

  12. Search protocol improvement Ⅱ • To avoid the condition where replying to a query can be used to identify a tag • Multiple tags share the same m bits, attacker cannot infer any unique information from the reply

  13. Search protocol improvement Ⅲ • The solution is to use noise to mask the reply

  14. Comments • 解決的問題 • 傳統的RFID都是有線連結後端資料庫 • 實際在應用上,可能的情況有貨車司機被派遣到遠距離的地區去收集附加tag的資料,貨車司機有2用功能的機器(PDA和RFID Reader),但無法上網連結後端資料庫確認tag的資訊 • 此論文建議的方法讓Reader可以儲存資訊,即使無法連線,只馮Reader也可以確認tag是否合法

  15. Comments • Advantage • Serverless RFID 的概念,在現實環境中確實是有需要 • 本篇的解法把原本存在Server端資料,透過可靠的certificate authority (CA) copy一份在reader • Disadvantage • 本篇所建議的secure authentication protocol是假設reader和tag之間是insecure,和之前學者研究的傳統RFID的authentication protocol並無差別 • 無法抵抗Tracking因為每次傳送的 都一樣

  16. Comments • Mobile RFID • 無法連結上網 (將資料庫存在mobile reader) • 假設 insecure channel between the reader and the tag • 任何人拿到mobile reader都可以去讀取資料,因此確認user的身份變的重要 • 除了預先將資料庫儲存在mobile reader,要使用mobile reader要先輸入password再進行讀取tag的動作

  17. Comments • Mobile RFID • 無線網路連結上網 • 假設 insecure channel between the server and the reader 和insecure channel between the reader and the tag • Mobile RFID reader, tag和Sensor node, 基地台有點相似,都是需要lightweight computation和無線傳輸,可以改良wireless sensor network相關安全機制 • 是否也可以考慮smart card + mobile reader • Registration phase • Login phase • Verification phase

More Related