Download presentation
Presentation is loading. Please wait.
Published bySpencer Laurence Dickerson Modified over 9 years ago
1
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, vol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31
2
2 Outline The Problem MARP eMARP Security and efficiency analysis Conclusion Comments
3
3 The Problem An attacker can eavesdrop the tag ’ s PIN. (mode change key of the tag t) There are many readers and agents in system, it will decrease overall performance of MARP scheme.
4
4 MARP
5
5 MARP-Initial setup phase
6
6 MARP- Privacy protection phase (Tag sleep mode)
7
7 MARP- Authentication phase (Tag wake mode )
8
8 MARP-Main scheme
9
9 eMARP
10
10 eMARP- Registration phase
11
11 eMARP- Agent working phase
12
12 Security and efficiency analysis Eavesdropping –One-way hash function and self refreshed PIN t –Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping Spoofing attack –Only authenticated reader or agent, who know secret PIN of the tag Location tracking Tag forgery
13
13 Comments The problem is solved –An attacker can eavesdrop the tag ’ s PIN. –There are many readers and agents in system, it will decrease overall performance of MARP scheme.
14
14 Comments (cont.) Advantage –This paper integrate mobile agent and public- key center to replace the disadvantage that the efficiency of the tag is not enough and security. Disadvantage –eMARP cannot resist Spoofing attack –eMARP cannot resist Location tracking
15
15 h(PIN t ) 1 ♁ h(Key t ) ♁ h(PIN t ) 2 ♁ h(Key t ) =h(PIN t ) 1 ♁ h(PIN t ) 2 h(PIN t ) 1 ♁ h(PIN t ) 2 ♁ h(PIN t ) 2 =h(PIN t ) 1 h(PIN t ) 1 ♁ h(PIN t ) 1 ♁ h(Key t ) =h(Key t ) ……… Registration phase
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.