Multi-domain Rfid Access Control Using Asymmetric Key Based Tag-reader Mutual Authentication
نویسندگان
چکیده
Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications depends on their ability to enforce access control to the tags that will be accessed by different stakeholders across multiple domains. In this paper, we address multi-domain RFID access control. We evaluate existing solutions in the literature and identify their limitations. We propose using asymmetric key based tag-reader mutual authentication to grant only the authorized read/write access to tags. Challenges in deploying such an asymmetrickey based approach are identified, and solutions to one salient challenge, certificate management in resource-constrained RFID, are presented. Finally, we present a server-based access control scheme for multi-domain RFID systems and perform security analysis..
منابع مشابه
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem whil...
متن کاملMutual Authentication Protocol for Role-Based Access Control Using Mobile RFID
The Internet has become the main transmission media in modern information systems due to the popularization of information technology and the rapid development of network technology. To use the Internet, we need complete security mechanisms which include requirements such as integrity, security and privacy to ensure the legal user can login to a remote server to get the service and resources th...
متن کاملPractical Schemes For Privacy & Security Enhanced RFID ( extended abstract )
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access cont...
متن کاملar X iv : 0 90 9 . 12 57 v 1 [ cs . C R ] 7 S ep 2 00 9 Practical Schemes For Privacy & Security Enhanced RFID
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access cont...
متن کاملAn optimal probabilistic solution for information confinement, privacy, and security in RFID systems
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The so...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008