![Page 1: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/1.jpg)
1
Protecting Your Privacy with a Mobile Agent Device in RFID
Environment
Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Ch
oSources: Wireless Personal Communication, vol. 51, no. 1,
pp. 165-178, 2009Speaker: C. H. WeiDate: 2009.10.31
![Page 2: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/2.jpg)
2
Outline
• The Problem• MARP• eMARP• Security and efficiency analysis• Conclusion• Comments
![Page 3: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/3.jpg)
3
The Problem
• An attacker can eavesdrop the tag’s PIN. (mode change key of the tag t)
• There are many readers and agents in system, it will decrease overall performance of MARP scheme.
![Page 4: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/4.jpg)
4
MARP
![Page 5: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/5.jpg)
5
MARP-Initial setup phase
![Page 6: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/6.jpg)
6
MARP- Privacy protection phase (Tag sleep mode)
![Page 7: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/7.jpg)
7
MARP- Authentication phase (Tag wake mode )
![Page 8: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/8.jpg)
8
MARP-Main scheme
![Page 9: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/9.jpg)
9
eMARP
![Page 10: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/10.jpg)
10
eMARP- Registration phase
![Page 11: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/11.jpg)
11
eMARP- Agent working phase
![Page 12: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/12.jpg)
12
Security and efficiency analysis• Eavesdropping
– One-way hash function and self refreshed PINt
– Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping
• Spoofing attack– Only authenticated reader or agent , who know secret
PIN of the tag• Location tracking
• Tag forgery
![Page 13: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/13.jpg)
13
Comments
• The problem is solved– An attacker can eavesdrop the tag’s PIN.
– There are many readers and agents in system, it will decrease overall performance of MARP scheme.
![Page 14: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/14.jpg)
14
Comments (cont.)
• Advantage– This paper integrate mobile agent and public-
key center to replace the disadvantage that the efficiency of the tag is not enough and security.
• Disadvantage– eMARP cannot resist Spoofing attack– eMARP cannot resist Location tracking
![Page 15: 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,](https://reader035.vdocuments.mx/reader035/viewer/2022062401/5a4d1b427f8b9ab0599a16b6/html5/thumbnails/15.jpg)
15
h(PINt)1♁h(Keyt) ♁ h(PINt)2♁h(Keyt)
=h(PINt)1♁h(PINt)2
h(PINt)1♁h(PINt)2 ♁h(PINt)2
=h(PINt)1
h(PINt)1 ♁h(PINt)1♁h(Keyt)
=h(Keyt)………Registration phase