Download presentation
Presentation is loading. Please wait.
Published byLeonard Floyd Modified over 9 years ago
1
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : 2012.08.31 Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
2
多媒體網路安全實驗室 OUTLINE INTRODUCTION 1 RELATED WORKS 2 PROPOSED PROTOCOL 33 SECURITY AND PRIVACY ANALYSIS 44 35 1 EFFICIENCY ANALYSIS CONCLUSION 46
3
多媒體網路安全實驗室 INTRODUCTION 2 Architecture of RFID
4
多媒體網路安全實驗室 3 INTRODUCTION RF Tag of RFID can be divided into two categories 1. Active RF Tag Need to install the battery. Sense distance is long than passive. 2. Passive RF Tag Doesn’t need to install the battery. Sense distance is short than active.
5
多媒體網路安全實驗室 RFID authentication protocols can be divided into four classes. 1. First - Weis et al. 2. Second – S. A. Weis 3. Third - Tree based protocol 4. Fourth - C. C. Tan RELATED WORKS
6
多媒體網路安全實驗室 5 PROPOSED PROTOCOL Notations S : The authentication server R i : An RFID reader T j : An RFID tag h(.) : A one-way function f k (.) : A one-way function with a secret key k ⊕ : Bitwise XOR operation
7
多媒體網路安全實驗室 6 PROPOSED PROTOCOL This proposed protocol can be divided into three phrases. 1. Assumptions 2. Initialization 3. Authentication
8
多媒體網路安全實驗室 PROPOSED PROTOCOL Assumptions 1. Each tag has enough memory to store a one-way hash function. 2. The hash functions are assumed to be known for the adversary, while the parameters used are secret. 3. Each tag has a rewriteable memory to store the security information. 4. Each tag can generate random numbers and perform hash function operations. 5. The channel between the reader and the authentication server is secure but another is not.
9
多媒體網路安全實驗室 8 PROPOSED PROTOCOL Initialization S User Special Channel RoRw
10
多媒體網路安全實驗室 9 PROPOSED PROTOCOL Authentication SRiRi TjTj
11
多媒體網路安全實驗室 10 SECURITY AND PRIVACY ANALYSIS The analysis can be divided into sixth parts 1. Eavesdropping 2. Tag cloning 3. Tag tracking 4. Replay attack 5. Compromising attack 6. Denial of service attack
12
多媒體網路安全實驗室 11 SECURITY AND PRIVACY ANALYSIS Eavesdropping SRiRi TjTj
13
多媒體網路安全實驗室 12 SECURITY AND PRIVACY ANALYSIS Tag cloning 12 SRiRi TjTj
14
多媒體網路安全實驗室 13 SECURITY AND PRIVACY ANALYSIS Tag tracking 13 SRiRi TjTj
15
多媒體網路安全實驗室 14 SECURITY AND PRIVACY ANALYSIS Replay attack 14 SRiRi TjTj
16
多媒體網路安全實驗室 15 SECURITY AND PRIVACY ANALYSIS Compromising attack 15 SRiRi TjTj
17
多媒體網路安全實驗室 16 SECURITY AND PRIVACY ANALYSIS Denial of service attack 16 SRiRi TjTj
18
多媒體網路安全實驗室 17 EFFICIENCY ANALYSIS
19
多媒體網路安全實驗室 CONCLUSION In this paper, we proposed a much more efficient authentication protocol utilizing one-way functions only than most of recent protocols. The server just compute one-way function three times to check the identifier of the tag and its response without any other searching operation. Our protocol provides a mutual authentication between the reader and the tag. 18
20
多媒體網路安全實驗室
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.