1 protecting your privacy with a mobile agent device in rfid environment authors: sang-soo yeo,...

15
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-S ung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, v ol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31

Upload: spencer-laurence-dickerson

Post on 18-Jan-2018

224 views

Category:

Documents


0 download

DESCRIPTION

3 The Problem An attacker can eavesdrop the tag ’ s PIN. (mode change key of the tag t) There are many readers and agents in system, it will decrease overall performance of MARP scheme.

TRANSCRIPT

Page 1: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

1

Protecting Your Privacy with a Mobile Agent Device in RFID

Environment

Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Ch

oSources: Wireless Personal Communication, vol. 51, no. 1,

pp. 165-178, 2009Speaker: C. H. WeiDate: 2009.10.31

Page 2: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

2

Outline

• The Problem• MARP• eMARP• Security and efficiency analysis• Conclusion• Comments

Page 3: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

3

The Problem

• An attacker can eavesdrop the tag’s PIN. (mode change key of the tag t)

• There are many readers and agents in system, it will decrease overall performance of MARP scheme.

Page 4: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

4

MARP

Page 5: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

5

MARP-Initial setup phase

Page 6: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

6

MARP- Privacy protection phase (Tag sleep mode)

Page 7: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

7

MARP- Authentication phase (Tag wake mode )

Page 8: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

8

MARP-Main scheme

Page 9: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

9

eMARP

Page 10: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

10

eMARP- Registration phase

Page 11: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

11

eMARP- Agent working phase

Page 12: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

12

Security and efficiency analysis• Eavesdropping

– One-way hash function and self refreshed PINt

– Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping

• Spoofing attack– Only authenticated reader or agent , who know secret

PIN of the tag• Location tracking

• Tag forgery

Page 13: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

13

Comments

• The problem is solved– An attacker can eavesdrop the tag’s PIN.

– There are many readers and agents in system, it will decrease overall performance of MARP scheme.

Page 14: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

14

Comments (cont.)

• Advantage– This paper integrate mobile agent and public-

key center to replace the disadvantage that the efficiency of the tag is not enough and security.

• Disadvantage– eMARP cannot resist Spoofing attack– eMARP cannot resist Location tracking

Page 15: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

15

h(PINt)1♁h(Keyt) ♁ h(PINt)2♁h(Keyt)

=h(PINt)1♁h(PINt)2

h(PINt)1♁h(PINt)2 ♁h(PINt)2

=h(PINt)1

h(PINt)1 ♁h(PINt)1♁h(Keyt)

=h(Keyt)………Registration phase