1 protecting your privacy with a mobile agent device in rfid environment authors: sang-soo yeo,...

Post on 18-Jan-2018

227 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

3 The Problem An attacker can eavesdrop the tag ’ s PIN. (mode change key of the tag t) There are many readers and agents in system, it will decrease overall performance of MARP scheme.

TRANSCRIPT

1

Protecting Your Privacy with a Mobile Agent Device in RFID

Environment

Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Ch

oSources: Wireless Personal Communication, vol. 51, no. 1,

pp. 165-178, 2009Speaker: C. H. WeiDate: 2009.10.31

2

Outline

• The Problem• MARP• eMARP• Security and efficiency analysis• Conclusion• Comments

3

The Problem

• An attacker can eavesdrop the tag’s PIN. (mode change key of the tag t)

• There are many readers and agents in system, it will decrease overall performance of MARP scheme.

4

MARP

5

MARP-Initial setup phase

6

MARP- Privacy protection phase (Tag sleep mode)

7

MARP- Authentication phase (Tag wake mode )

8

MARP-Main scheme

9

eMARP

10

eMARP- Registration phase

11

eMARP- Agent working phase

12

Security and efficiency analysis• Eavesdropping

– One-way hash function and self refreshed PINt

– Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping

• Spoofing attack– Only authenticated reader or agent , who know secret

PIN of the tag• Location tracking

• Tag forgery

13

Comments

• The problem is solved– An attacker can eavesdrop the tag’s PIN.

– There are many readers and agents in system, it will decrease overall performance of MARP scheme.

14

Comments (cont.)

• Advantage– This paper integrate mobile agent and public-

key center to replace the disadvantage that the efficiency of the tag is not enough and security.

• Disadvantage– eMARP cannot resist Spoofing attack– eMARP cannot resist Location tracking

15

h(PINt)1♁h(Keyt) ♁ h(PINt)2♁h(Keyt)

=h(PINt)1♁h(PINt)2

h(PINt)1♁h(PINt)2 ♁h(PINt)2

=h(PINt)1

h(PINt)1 ♁h(PINt)1♁h(Keyt)

=h(Keyt)………Registration phase

top related