23
AN EFFICIENT AND SECURE RFID SECURITY METHOD WITH OWNERSHIP TRANSFER Authors: Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi Source: Computational Intelligence and Security, 2006 International Conference on Presenter: Hsin-Ruey Tsai

An Efficient and Secure RFID Security Method with Ownership Transfer

  • Upload
    faraji

  • View
    30

  • Download
    0

Embed Size (px)

DESCRIPTION

An Efficient and Secure RFID Security Method with Ownership Transfer. Authors: Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi Source: Computational Intelligence and Security, 2006 International Conference on Presenter: Hsin-Ruey Tsai. - PowerPoint PPT Presentation

Citation preview

Page 1: An Efficient and Secure RFID Security Method with Ownership Transfer

AN EFFICIENT AND SECURE RFID SECURITY METHOD WITH OWNERSHIP TRANSFER

Authors: Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu TakahashiSource: Computational Intelligence and Security, 2006 International Conference on Presenter: Hsin-Ruey Tsai

Page 2: An Efficient and Secure RFID Security Method with Ownership Transfer

FIVE REQUIREMENTS 1. Indistinguishability

2. Forward security

3. Resistance against replay attack

4. Resistance against tag killing

5. Ownership transferability

Page 3: An Efficient and Secure RFID Security Method with Ownership Transfer

INDISTINGUISHABILITY No adversary can distinguish output from

RFID tags.

Page 4: An Efficient and Secure RFID Security Method with Ownership Transfer

FORWARD SECURITY Even if present data on RFID tags are leaked

to an adversary, past data still remain secure.

No tamper resistance

Page 5: An Efficient and Secure RFID Security Method with Ownership Transfer

RESISTANCE AGAINST REPLAY ATTACK

No adversary can succeed in a replay attack that spoofs a legitimate RFID tag.

Page 6: An Efficient and Secure RFID Security Method with Ownership Transfer

RESISTANCE AGAINST TAG KILLING

RFID tags shall be resistant against a large number of incoming queries.

no additional memoryno upper limit

Page 7: An Efficient and Secure RFID Security Method with Ownership Transfer

OWNERSHIP TRANSFERABILITY

Ownership is transferable without violation of previous and present RFID tag owner’s privacy.

Page 8: An Efficient and Secure RFID Security Method with Ownership Transfer

ANALYSIS OF PREVIOUS SCHEMES

Challenge–Response Type Schemes

Ohkubo Type Schemes

Other Type Schemes

Page 9: An Efficient and Secure RFID Security Method with Ownership Transfer

HASH LOCK SCHEME 03

Page 10: An Efficient and Secure RFID Security Method with Ownership Transfer

RANDOMIZED HASH LOCK SCHEME

Page 11: An Efficient and Secure RFID Security Method with Ownership Transfer

HASH-BASED ID VARIATION SCHEME 04

Page 12: An Efficient and Secure RFID Security Method with Ownership Transfer

THE RKKW SCHEME 05

Page 13: An Efficient and Secure RFID Security Method with Ownership Transfer

KANG–NYANG’S SCHEME 05

Page 14: An Efficient and Secure RFID Security Method with Ownership Transfer

OHKUBO SCHEME

Page 15: An Efficient and Secure RFID Security Method with Ownership Transfer

MODIFIED OHKUBO SCHEME

Page 16: An Efficient and Secure RFID Security Method with Ownership Transfer

UNIDENTIFIABLE ANONYMOUS ID SCHEME

Page 17: An Efficient and Secure RFID Security Method with Ownership Transfer

OWNER CHANGE SCHEME 05

Page 18: An Efficient and Secure RFID Security Method with Ownership Transfer

PROPOSED METHOD The protocol of the proposed method consists

of:

• A writing process

• An authentication process

• An ownership transfer process

Page 19: An Efficient and Secure RFID Security Method with Ownership Transfer

PROPOSED METHOD

Page 20: An Efficient and Secure RFID Security Method with Ownership Transfer

INDISTINGUISHABILITY

Page 21: An Efficient and Secure RFID Security Method with Ownership Transfer

FS & RA Because of updated by changing symmetric

key. Even if Eki (ID) is leaked to the adversary, neither the ID nor Ekj (ID) leaks to the adversary, where i > j. Unless the ID is leaked, the encryption function E satisfies the one-wayness. This means that the adversary cannot compute Ek j (ID) from Eki(ID) unless the ID is leaked.

Page 22: An Efficient and Secure RFID Security Method with Ownership Transfer

TK & OT 1. Tags require no additional memory for

storing random numbers each reading a tag. 2. Tags have no upper limit of reading tags

1. A protocol to be able to securely change an

owner’s key used for encryption is built into

the RFID system. 2. Owners can change their key at any time..

Page 23: An Efficient and Secure RFID Security Method with Ownership Transfer

EFFICIENCY OF PROPOSED METHOD