Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,

Similar presentations


Presentation on theme: "1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,"— Presentation transcript:

1 1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim, Ki-Sung Yang, Sung-Eon Cho Sources: Wireless Personal Communication, vol. 51, no. 1, pp. 165-178, 2009 Speaker: C. H. Wei Date: 2009.10.31

2 2 Outline The Problem MARP eMARP Security and efficiency analysis Conclusion Comments

3 3 The Problem An attacker can eavesdrop the tag ’ s PIN. (mode change key of the tag t) There are many readers and agents in system, it will decrease overall performance of MARP scheme.

4 4 MARP

5 5 MARP-Initial setup phase

6 6 MARP- Privacy protection phase (Tag sleep mode)

7 7 MARP- Authentication phase (Tag wake mode )

8 8 MARP-Main scheme

9 9 eMARP

10 10 eMARP- Registration phase

11 11 eMARP- Agent working phase

12 12 Security and efficiency analysis Eavesdropping –One-way hash function and self refreshed PIN t –Most of communication are performed using a public key cryptosystem, it is safe from eavesdropping Spoofing attack –Only authenticated reader or agent, who know secret PIN of the tag Location tracking Tag forgery

13 13 Comments The problem is solved –An attacker can eavesdrop the tag ’ s PIN. –There are many readers and agents in system, it will decrease overall performance of MARP scheme.

14 14 Comments (cont.) Advantage –This paper integrate mobile agent and public- key center to replace the disadvantage that the efficiency of the tag is not enough and security. Disadvantage –eMARP cannot resist Spoofing attack –eMARP cannot resist Location tracking

15 15 h(PIN t ) 1 ♁ h(Key t ) ♁ h(PIN t ) 2 ♁ h(Key t ) =h(PIN t ) 1 ♁ h(PIN t ) 2 h(PIN t ) 1 ♁ h(PIN t ) 2 ♁ h(PIN t ) 2 =h(PIN t ) 1 h(PIN t ) 1 ♁ h(PIN t ) 1 ♁ h(Key t ) =h(Key t ) ……… Registration phase


Download ppt "1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,"

Similar presentations


Ads by Google