Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers Author : Dirk Henrici and Paul Muller.

Slides:



Advertisements
Similar presentations
Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
Advertisements

M-technology pilot programme Radio Frequency Identification Device (RFID)
1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
Receiving from Vendor WcBc is configured for Multiple types of Receiving. The transactions are configured separately. The main difference is very simple.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
Guide to Oracle10G1 Introduction To Forms Builder Chapter 5.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Security in RFID Presented By… NetSecurity-Spring07
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Physical Database Monitoring and Tuning the Operational System.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
1 SYSTEMS DESIGN Pertemuan 13 s.d 20 Matakuliah: A0554/Analisa dan Perancangan Sistem Informasi Akuntansi Tahun: 2006.
10/23/06 Bell Work Reading/Writing What are RFIDsWhat are RFIDs Mathematics If a RFID receivers can read tags every second. How many tags can you.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Computer Science & Engineering 2111 Introduction to Database Management Systems Relationships and Database Creation 1 CSE 2111 Introduction to Database.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
- 1 - Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li IEEE Transactions on Wireless Communication APRIL.
Developing RFID Application In Supply Chain
Chapters 17 & 18 Physical Database Design Methodology.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
 Maintains the Instrument Database  Generates the Calibration Schedules  Maintains Calibration Records  Provides Facility to enter All types of.
The Fun That Is File Structures Pages By: Christine Zeitschel.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Wal-Mart leads RFID adoption Prepared by: Rayma Figueroa Olesya Tkachenko Olya Elfimova.
The Project – Database Design. The following is the high mark band for the Database design: Analysed a given situation and produced and analysed a given.
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
EE/CS 481 Spring Founder’s Day, 2008 University of Portland School of Engineering SMS RFID SMS (Security Monitoring System) Team Sage Thrasher Rebekah.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Final Project Presentation.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
Use of ICT in Data Management AS Applied ICT. Back to Contents Back to Contents.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
RFID SECURITY.
Web Service-Based Remote Monitoring System for Smart Home Space Sheng Cai Joshua Ferguson Xinhui Hu Wei Wu Project for CSE535 Mobile Computing.
Radio Frequency Identification (RFID)
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
TOMIN: Trustworthy Mobile Cash with Expiration-date Attached Author: Rafael Martínez-Peláez and Francisco Rico-Novella. Source: Journal of Software, 2010,
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
1/18 Talking to Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz 외 2 명 in Xerox Palo Alto Research Center Presentation: Lee Youn-ho.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
A Signature-like Primitive for Broadcast-encryption- based Systems Jeffrey Lotspiech IBM Almaden Research Center.
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
Revisting Unpredictability-Based RFID Privacy Models
Presentation transcript:

Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers Author : Dirk Henrici and Paul Muller Presented by Li-yuan Lai March 20, 2007

Outline Introduction Scheme Normal Operation Example Conclusion

Introduction RFID may emerge as one of the most pervasive computing technologies in history. But products equipped with RFID tags enable tracking of persons by the tags they carry. This paper introduces a simple scheme relying on one-way hash functions that greatly enhances location privacy.

Scheme define y = h(x) as a cryptographic one-way hash function

- Database-identifier (“DB-ID”) read only, optionally writable - Current ID (“ID”) read/write - Transaction number (“TID”) read/write - Last successful transaction number (“LST”) read/write - Additional fields for user data or a master key are conceivable but not required at all - Hash of current ID (“HID”), acting as primary index of the table - Current ID (“ID”) - Last transaction number (“TID”) - Last successful transaction number (“LST”) - Associated DB entry (“AE”) - A reference to tag data / user data (“DATA”)

Normal Operation 1. tag : h(ID) 2. When queried, TID+1 3. send : h(ID), DB-ID, h(TID 。 ID), △ TID ( △ TID =TID - LST ) 4. database : TID‘ =△ TID + LST, calculate h(TID’ 。 ID) 5. update : create RND, generating ID’ ( ID‘= RND 。 ID ) 6. respond : RND, h(RND 。 TID’ 。 ID) 7. receiver : check hash, changing ID 、 TID

initial : send : H(14), tagdb, h(10), 1 ( h(10) = h(4 。 14) ) Suppose RND = 13, then ID’ = h(13 。 14) = h(3) respond : 13, h(7) ( h(7) = h(13 。 4 。 14) ) final : Suppose ID = 14, DB-ID = tagdb, TID = LST = 3 tagdb

Conclusion The main benefit of the proposed scheme is its simplicity: It only requires a hash function in the tag and data management at the back- end. it is enhancing location privacy greatly without restraining other applications.