Method of Secret Splitting: Novel Way to Authenticate Rfid Tags and Reader

نویسندگان

  • Debashreet Das
  • Rasmita Rautray
چکیده

A globally accepted, auto-identification technology, became popular in the post World War II period – the RFID technology works without any contact between the participating entities. As an auto-identification technology, RFID has overcome the demerits of barcodes. RFID find its applications in pharmaceuticals, animal tracking, and inventory control to name a few. However, inspite of its huge area of applications, deploying RFID technology has become a great challenge for the organizations. In many cases, either the reader is not properly authenticated or tags are not authenticated, due to which malicious tags easily communicate with the reader. Hence, in this article, we propose to extend the scheme of “secret splitting” which involves the reader, tag and also the back-end server in the process of authentication, thus eliminating the threat of replay attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

Privacy and Security in Library RFID Issues, Practices, and Architectures

We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self-checkout, and make possible comprehensive inventory. Unlike supply-chain RFID, library RFID requires...

متن کامل

Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy

Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where adversaries must authenticate to the verifier in the presence of honest provers; (2) terrorist fraud, where...

متن کامل

Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags

We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag suggested by Juels, Rivest, and Szydlo, our scheme makes use of special tags that we call noisy tags. Noisy tags are owned by the reader’s manager and set out within the reader’s field. They are regular RFID tags that gene...

متن کامل

Modeling Privacy for Off-Line RFID Systems

This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only capable of compromising tags, but also of compromising readers. This more properly models large scale deployment of RFID technology such as in public transport ticketing systems and supply-chain management systems. In...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012