120 likes | 230 Views
Proxy Framework for Enhanced RFID Security and Privacy. Authors: Tassos Dimitriou Source: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE,10-12 Jan. 2008 Page(s):843 - 847 Speaker: Chia-Min Lin. Outline. Introduction Design Goals Proxy Operations Conclusions
E N D
Proxy Framework for Enhanced RFID Security and Privacy Authors: Tassos Dimitriou Source: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE,10-12 Jan. 2008 Page(s):843 - 847 Speaker: Chia-Min Lin
Outline • Introduction • Design Goals • Proxy Operations • Conclusions • Comment
Introduction • User can specify when and where information will be released • Tag can transfer it to another user
Design Goals(1/2) • Privacy • Protection against tag spoofing or cloning • Protection against impersonation attacks
Design Goals(2/2) • Policy enforcement and access control • Transferability and tag release • Simplicity and Efficiency
Proxy Operations(1/5) Rewrite Request , NR TAG Proxy NT⊕FCID(NR), FCID(NT) NewID⊕FCID(NR, NT ), FCID(NewID, K, NR, NT ) • FK(M):psedo-random function applied on a message M • N:a random number used once
Proxy Operations(2/5) • Enhancing RFID privacy CID = TrueID Scan Request; NR TAG Reader NT ; TrueID⊕FCID(NR,NT ); FCID(TrueID , K, NR, NT )
Proxy Operations(3/5) • Putting a tag to sleep Sleep Request TAG Proxy NT FCID(K ,”Sleep”, NT )
Proxy Operations(4/5) • Awaking a tag Wake-up Request TAG Proxy NT FCID(K ,” Wake-up”, NT )
Proxy Operations(5/5) • Bringing a tag back to its original state ReleaseRequest TAG Proxy NT FCID(K, “Revert“, NT )
Conclusions • User has full control of the tags • The tag can be transferred to other users
Comment • Tag can make use of proxy to do the encryption which need a large amount of operation