Presentation is loading. Please wait.

Presentation is loading. Please wait.

RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp. 490-506.

Similar presentations


Presentation on theme: "RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp. 490-506."— Presentation transcript:

1 RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp. 490-506 Authors :Mike Burmester, Breno De Medeiros Speaker : Chia- Hung Chang Date : 2012-11-25 A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp.436-441 Authors :Jaemin Park

2 Outline Introduction Relate Work Proposed Scheme Security analysis Conclusion & Future Work 2

3 Introduction(1/2) 3 Sever Tag Reader (3)Authenticate (1)Request (2)Response (4) Forward phase

4 Introduction(2/2) Tag in C1Gen2 only can use  Pseudo-random number generator(PRNG) - 16 bits  Cyclic Redundancy Code(CRC) - 16 bits 4

5 Protocol notations 5 Tag Reader Tag issuing system Backend sever with DB RFID code (eg. EPC) PC bits Access password Kill password Random numbers

6 6 Relate Work - Duc-Park-Lee-Kim RFID Protocol [10](1/2)

7 7 Relate Work - Duc-Park-Lee-Kim RFID Protocol [10] (2/2)

8 8 Relate Work - Chien-Chen RFID Protocol [9](1/2)

9 9 Relate Work - Chien-Chen RFID Protocol [9] (2/2)

10 Proposed Scheme1 - Scheme design  3 Trivial protocol TRAP 0 - RNG TRAP 1 - Modify RNG TRAP 2 - Anonymity (TRAP 3  Class2 Gen2) 10

11 11 Proposed Scheme1 - TRAP 0

12 Proposed Scheme1 - TRAP 1(1/2) 12  Pseudo-random number generator(PRNG)  Concerns exhaustive-key attacks ‚ Concerns related-key attacks  Pseudo-random function (PRF)

13 13 Proposed Scheme1 - TRAP 1(2/2)

14 14 Proposed Scheme1 - TRAP 2*

15 A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag Source : Future Generation Communication and Networking, VOL. 1, NO. 5, Dec 2007, pp.436-441 Authors :Jaemin Park

16 Proposed Scheme2 - Setting 16

17 17 Proposed Scheme2 - Authenticate (1/2)

18 18 Proposed Scheme2 - Authenticate (2/2)

19 Comparison - A Practical Approach for Enhancing Security of EPC global RFID Gen2 Tag 19

20 Conclusions Two papers can both follow C1Gen2 Both can defense replay attack and have anonymity 20


Download ppt "RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp. 490-506."

Similar presentations


Ads by Google