160 likes | 300 Views
Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng , and Qun Li IEEE Transactions on Wireless Communication APRIL 2008. Taesung Kim 2008.09.11. Contents. Abstract Introduction Related Work RFID Privacy and Security RFID Authentication RFID Search.
E N D
Secure and Serverless RFID Authentication and Search ProtocolsChiu C. Tan, Bo Sheng, and Qun LiIEEE Transactions on Wireless Communication APRIL 2008 TaesungKim 2008.09.11
Contents • Abstract • Introduction • Related Work • RFID Privacy and Security • RFID Authentication • RFID Search
Introduction • What is Radio Frequency Identification? Tag Reader Antenna
Introduction • Solution for RFID Security and Privacy problem • Central database model • Three players in this model • RFID reader, tag, database • 리더와 태그의 상호인증에 database에 저장된 인증정보를 이용 • Database와 연결이 없는 오프 사이트 위치에 있는 리더는 태그의 정보를 볼 수 없다. • Simple alternative • Downloading database to reader • Mobile reader can be stolen. • An adversary will have access to information which include unique tag id and password. • The adversary can make fake tag based on this information.
Introduction • This paper suggest • Security protection as the central database model without persistent connection to the database. • RFID searching problem • Single reader, multiple tag 상황에서 특정 tag의 정보를 검색하는 경우. • Authenticating each tag one at a time is a time consuming process. • This paper suggest several solutions for RFID searching problem.
Related Work • Weis • randomized hash lock • Tag reply to reader query • (r, ID⊕fk(r)) • where r is a random number generated by the tag, • k is the tag’s secret key • and fkis a pseudorandom function. • A secure database searches the ID/secret key, then the real tag ID returned to reader. • Molnar and Wagner • Randomized hash lock scheme does not defend against an eavesdropper. • Reader가 secret key를 알고 있다고 가정 • Reader와 tag가 각각 random number를 만들고 교환한다.
Related Work • Tag reply • ID⊕fk(0, r1, r2) • Compromised reader problem. • Dimitriou • Tag reply • (h(IDi), nt, hIDi(nt, nr)) • where IDiis the tag secret. • nt, nr are both random nubers generated by tag and reader • Database return hIDi+1(nt, nr) • The tag update its screct IDi+1
RFID Authentication • Notations
RFID Authentication • Set up • R obtains r and L from a certificate authority, CA. • Tag, T contains a unique value id, a unique secret t. • Access List Li
RFID Authentication • Authentication Protocol
RFID Search • 특정 태그를 찾고자 할 때 • Reader issues a search request such that only authenticated tag can understand. • The tag reply in such that only an authenticated reader can understand.
RFID Search • Secure search protocol
RFID Search • Search protocol improvement • Tag remember the last used random number.
RFID Search • Search protocol improvement • A challenge and response method
RFID Search • Search protocol improvement • A noise to mask the reply