Method of Secret Splitting: Novel Way to Authenticate Rfid Tags and Reader
نویسندگان
چکیده
A globally accepted, auto-identification technology, became popular in the post World War II period – the RFID technology works without any contact between the participating entities. As an auto-identification technology, RFID has overcome the demerits of barcodes. RFID find its applications in pharmaceuticals, animal tracking, and inventory control to name a few. However, inspite of its huge area of applications, deploying RFID technology has become a great challenge for the organizations. In many cases, either the reader is not properly authenticated or tags are not authenticated, due to which malicious tags easily communicate with the reader. Hence, in this article, we propose to extend the scheme of “secret splitting” which involves the reader, tag and also the back-end server in the process of authentication, thus eliminating the threat of replay attack.
منابع مشابه
افزایش سرعت شناسایی در سیستمهای RFID
Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...
متن کاملPrivacy and Security in Library RFID Issues, Practices, and Architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID; the technology promises to relieve repetitive strain injury, speed patron self-checkout, and make possible comprehensive inventory. Unlike supply-chain RFID, library RFID requires...
متن کاملKey Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
Distance-bounding protocols address man-in-the-middle (MITM) in authentication protocols: by measuring response times, verifiers ensure that the responses are not purely relayed. Dürholz et al. [13] formalize the following attacks against distancebounding protocols: (1) mafia fraud, where adversaries must authenticate to the verifier in the presence of honest provers; (2) terrorist fraud, where...
متن کاملNoisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag suggested by Juels, Rivest, and Szydlo, our scheme makes use of special tags that we call noisy tags. Noisy tags are owned by the reader’s manager and set out within the reader’s field. They are regular RFID tags that gene...
متن کاملModeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only capable of compromising tags, but also of compromising readers. This more properly models large scale deployment of RFID technology such as in public transport ticketing systems and supply-chain management systems. In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012