Upload
karli
View
23
Download
0
Embed Size (px)
DESCRIPTION
Protecting Your Privacy with a Mobile Agent Device in RFID Environment. Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, vol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31. - PowerPoint PPT Presentation
Citation preview
1
Protecting Your Privacy with a Mobile Agent Device in RFID
Environment
Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Ch
oSources: Wireless Personal Communication, vol. 51, no. 1,
pp. 165-178, 2009Speaker: C. H. WeiDate: 2009.10.31
2
Outline
• The Problem
• MARP
• eMARP
• Security and efficiency analysis
• Conclusion
• Comments
3
The Problem
• An attacker can eavesdrop the tag’s PIN. (mode change key of the tag t)
• There are many readers and agents in system, it will decrease overall performance of MARP scheme.
4
MARP
5
MARP-Initial setup phase
6
MARP- Privacy protection phase (Tag sleep mode)
7
MARP- Authentication phase (Tag wake mode )
8
MARP-Main scheme
9
eMARP
10
eMARP- Registration phase
11
eMARP- Agent working phase
12
Security and efficiency analysis
• Eavesdropping– One-way hash function and self refreshed PINt
– Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping
• Spoofing attack– Only authenticated reader or agent , who know secret
PIN of the tag
• Location tracking
• Tag forgery
13
Comments
• The problem is solved– An attacker can eavesdrop the tag’s PIN.
– There are many readers and agents in system, it will decrease overall performance of MARP scheme.
14
Comments (cont.)
• Advantage– This paper integrate mobile agent and public-
key center to replace the disadvantage that the efficiency of the tag is not enough and security.
• Disadvantage– eMARP cannot resist Spoofing attack
– eMARP cannot resist Location tracking
15
h(PINt)1♁h(Keyt) ♁ h(PINt)2♁h(Keyt)
=h(PINt)1♁h(PINt)2
h(PINt)1♁h(PINt)2 ♁h(PINt)2
=h(PINt)1
h(PINt)1 ♁h(PINt)1♁h(Keyt)
=h(Keyt)………Registration phase