Title: PrivacyEnhanced Authentication Scheme on RFID Systems
1Privacy-Enhanced Authentication Scheme on RFID
Systems
2Research Characterization
- Secure RFID transmission protocol
- RFID anti-collision protocol
- Front-end privacy-aware authentication scheme
- Back-end anonymous communication process
- Exploring potential security threats under
current RFID technology - Problem formulation
- Practicable solution
3RFID System Overview
Tag
Antenna
Mi-2
M4
M5
Tag
Database
Mi-1
Mi
M3
M2
Tag
Reader
M1
Server
4 Security Principles
Data Security
Active Attacks
Secure RFID System
Forward Security
Passive Attacks
Anonymity
5Potential Threats 1/2
Attacker cannot derive the identity of specific
tag from messages M1, M2, Mi.
How to protect the secret information contained
in each message Mi ?
M1
Antenna
Mi-1
M2
M3
Mi
M4
Tag
Attacker cannot derive the past information from
messages M1, M2, Mi-1 when tag was compromised
at session i.
Attacker cannot utilize the eavesdropped message
Mi to iteratively attack the server.
Reader
Eavesdrop message M1, M2, M3, Mi-1
6Potential Threats 2/2
Server
Communication
Tag
Normal Process
Update information
(Key K)
(Key K)
Update
Update
H(K)
H(K)
Server
Communication
Tag
DoS Attack
Update Information
(Key K)
(Key K)
Update
Out of Synchronization
H(K)
7Research Framework
Back-end communication process
Front-end authentication scheme
EPCGlobal
Wireless LAN
Secure RFID transmission protocol
ISO Standards
P2P Network
Next Generation?
MANETs
Efficient tree-based signal-collision
resolution protocol
8Research result Future work
Secure RFID transmission protocol
Oncoming
Back-end anonymous communication process
Ongoing
Front-end privacy-aware authentication scheme
Completed
Front-end RFID anti-collision protocol
Ongoing