110 likes | 239 Views
A lightweight mutual authentication protocol for RFID networks. 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung Fei Yau. Outline. Introduction Current solutions approach Security scheme requirement
E N D
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung Fei Yau
Outline • Introduction • Current solutions approach • Security scheme requirement • Proposed lightweight mutual authentication protocol • Conclusion
Introduction • Two key elements:(1)RFID tag, or transponder, carries object-identifying data.(2) RFID reader, or transceiver, reads and writes tag data. • Privacy issues of a RFID system. • Reader security issue.
Introduction • Tag security issue
Current solutions approach • Extra device added approach(a) Faraday cage(b) Blocker tag(c) Active jamming • Radio frequency modification approach(a) Reader change frequency(b) Tag change frequency • Other approach(a) Kill tag(b) Hash lock [Unlocked if y=h(x)]
Security scheme requirement • The focus puts on the security concern over a RFID system using passive tag.(a) Indistinguishability(b) Forward security • RSA? Lightweight challenge-response protocol
Proposed lightweight mutual authentication protocol • Based on hash function [hash chain technique]
Proposed lightweight mutual authentication protocol • The basic framework of the proposed lightweight security protocol
The proposed security protocol • Initialization(1) Each tag comes with an initial secret information S0 & c (transaction counter)(2) Backend included : S0, Wk,
The proposed security protocol • Procedure step
Conclusion • The proposed scheme can be easily adapted to the limited resource criteria of a passive tag.