Scalable RFID Security Protocol

نویسندگان

  • Morshed U. Chowdhury
  • Noriyoshi SANO
چکیده

Radio Frequency Identification (RFID) system poses serious security and privacy risks that must be carefully mitigated in order to realize the numerous benefits the technology has to offer. In this talk I am going to present different security issues required to secure a RFID system. I will also describe some desirable characteristics of RFID security protocols for use in operational distributed environment. I will then present a security protocol and a layered security framework and show how it will secure the RFID system while at the same time provide operational efficiency. The framework has the ability to achieve compatibility with distributive systems (DS) in a multi reader situation. The novelty of this work is that it reduces trade-offs caused by the security protocols such as slow performance, redundant tag read and scope of intercepting transmission. It does this using a security check handoff (SCH), improved search techniques and layered architecture. I will present experimental results to show that the new search technique is significantly improved compared to the linear search based protocols. Biography Morshed Chowdhury received his PhD from Monash University, Australia in 1999. Dr. Chowdhury is an academic staff member in the School of Information Technology, Deakin University, Melbourne, Australia. Prior to joining Deakin University, he was an academic staff in Gippsland School of Computing and Information Technology, Monash University, Australia. Dr. Chowdhury has more than 12 years of industry experience in Bangladesh and Australia. As an International Atomic Energy Agency(IAEA) fellow he has visited a number of International Laboratory/Centres such as Bhaba Atomic Research Centre, India, Brookhaven National Laboratory, New York, USA, International Centre for Theoretical Physics (ICTP)-Italy Dr Chowdhury’s current research interests are information security, wireless network security, and privacy & security of social networks. He has published more than sixty eight research papers including a number of journal papers, conference papers and book chapters. He has organized a number of international conferences and served as a member of the technical and program committee of several international conferences since 2001. He is also acted as reviewer of many journal papers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Finding RFID Tags using Scalable, Efficient and Secure Search Protocol

Massively deploying RFID systems that preserve data integrity and security is a major challenge of the coming years. Since RFID tags are extremely constrained in time and space, enforcing high level of security with excessive cryptographic computation is not possible. Secured mechanisms for tag authentication have been in the midst of researcher’s interest for almost a decade. One extension of ...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

A note on the security of two improved RFID protocols

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012