15
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-S ung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, v ol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31

Protecting Your Privacy with a Mobile Agent Device in RFID Environment

  • Upload
    karli

  • View
    23

  • Download
    0

Embed Size (px)

DESCRIPTION

Protecting Your Privacy with a Mobile Agent Device in RFID Environment. Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, vol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31. - PowerPoint PPT Presentation

Citation preview

Page 1: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

1

Protecting Your Privacy with a Mobile Agent Device in RFID

Environment

Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Ch

oSources: Wireless Personal Communication, vol. 51, no. 1,

pp. 165-178, 2009Speaker: C. H. WeiDate: 2009.10.31

Page 2: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

2

Outline

• The Problem

• MARP

• eMARP

• Security and efficiency analysis

• Conclusion

• Comments

Page 3: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

3

The Problem

• An attacker can eavesdrop the tag’s PIN. (mode change key of the tag t)

• There are many readers and agents in system, it will decrease overall performance of MARP scheme.

Page 4: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

4

MARP

Page 5: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

5

MARP-Initial setup phase

Page 6: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

6

MARP- Privacy protection phase (Tag sleep mode)

Page 7: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

7

MARP- Authentication phase (Tag wake mode )

Page 8: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

8

MARP-Main scheme

Page 9: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

9

eMARP

Page 10: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

10

eMARP- Registration phase

Page 11: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

11

eMARP- Agent working phase

Page 12: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

12

Security and efficiency analysis

• Eavesdropping– One-way hash function and self refreshed PINt

– Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping

• Spoofing attack– Only authenticated reader or agent , who know secret

PIN of the tag

• Location tracking

• Tag forgery

Page 13: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

13

Comments

• The problem is solved– An attacker can eavesdrop the tag’s PIN.

– There are many readers and agents in system, it will decrease overall performance of MARP scheme.

Page 14: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

14

Comments (cont.)

• Advantage– This paper integrate mobile agent and public-

key center to replace the disadvantage that the efficiency of the tag is not enough and security.

• Disadvantage– eMARP cannot resist Spoofing attack

– eMARP cannot resist Location tracking

Page 15: Protecting Your Privacy with a Mobile Agent Device in RFID Environment

15

h(PINt)1♁h(Keyt) ♁ h(PINt)2♁h(Keyt)

=h(PINt)1♁h(PINt)2

h(PINt)1♁h(PINt)2 ♁h(PINt)2

=h(PINt)1

h(PINt)1 ♁h(PINt)1♁h(Keyt)

=h(Keyt)………Registration phase