Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

31.01.2017

Privacy Model for Threshold RFID System Based on PUF

verfasst von: Sonam Devgan Kaul, Amit K. Awasthi

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to enhance shared control of the secret among multiple RFID tags and to ensure secure communication through an insecure channel, we present in this paper a new idea of threshold RFID system. We extend well-known Vaudenay’s RFID privacy model (Vaudenay in Adv Cryptolo 68–87, 2007) to make the RFID system acceptable for threshold secret sharing system among n tags. To show its implementation and to resist tag compromising attack, we design an efficient threshold RFID authentication protocol based on physical unclonable functions. It is a method of distributing a secret s among a set of n RFID tags in such a way that any set of \(t (t<n)\) or more tags will recover the shared secret s only after successful mutual authentication while the secret will remain uncertain if any of them will be unauthorized tag or a group of \(t-1\) or less tags have given their information. In order to enhance tag anonymity, we use dynamic security parameters which are updated after each successful run of mutual authentication session. Furthermore, via analyzing security and privacy formally and informally, we demonstrate that our scheme achieves destructive privacy and withstand against various known attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vaudenay, S. (2007). On privacy models for RFID. In K. Kurosawa (Ed.), Advances in Cryptology – ASIACRYPT 2007. Lecture Notes in Computer Science (Vol. 4833, pp. 68–87). Berlin: Springer.CrossRef Vaudenay, S. (2007). On privacy models for RFID. In K. Kurosawa (Ed.), Advances in Cryptology – ASIACRYPT 2007. Lecture Notes in Computer Science (Vol. 4833, pp. 68–87). Berlin: Springer.CrossRef
2.
Zurück zum Zitat Kaul, S. D., & Awasthi, A. K. (2013). RFID authentication protocol to enhance patient medication safety. Journal of medical systems, 37(6), 1–6.CrossRef Kaul, S. D., & Awasthi, A. K. (2013). RFID authentication protocol to enhance patient medication safety. Journal of medical systems, 37(6), 1–6.CrossRef
3.
Zurück zum Zitat Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in Cryptology – CT-RSA 2006. Lecture Notes in Computer Science (Vol. 3860, pp. 115–131). Berlin: Springer.CrossRef Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In D. Pointcheval (Ed.), Topics in Cryptology – CT-RSA 2006. Lecture Notes in Computer Science (Vol. 3860, pp. 115–131). Berlin: Springer.CrossRef
4.
Zurück zum Zitat Dodis, Y., Ostrovsky, R., Reyzin, L., & Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.MathSciNetCrossRefMATH Dodis, Y., Ostrovsky, R., Reyzin, L., & Smith, A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97–139.MathSciNetCrossRefMATH
6.
Zurück zum Zitat Avoine, G. (2005). Adversarial model for radio frequency identification. IACR Cryptology ePrint Archive, 2005, 49. Avoine, G. (2005). Adversarial model for radio frequency identification. IACR Cryptology ePrint Archive, 2005, 49.
7.
Zurück zum Zitat Lim, C., & Kwon, T. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. Information and Communications Security, 4307, 1–20.MathSciNetCrossRef Lim, C., & Kwon, T. (2006). Strong and robust RFID authentication enabling perfect ownership transfer. Information and Communications Security, 4307, 1–20.MathSciNetCrossRef
8.
Zurück zum Zitat Juels, A., & Weis, S. A. (2009). Defining strong privacy for RFID. ACM Transactions on Information and System Security (TISSEC), 13(1), 1–7.CrossRef Juels, A., & Weis, S. A. (2009). Defining strong privacy for RFID. ACM Transactions on Information and System Security (TISSEC), 13(1), 1–7.CrossRef
9.
Zurück zum Zitat Paise, R.I., & Vaudenay, S. (2008). Mutual authentication in RFID: Security and privacy. In Proceedings of the 2008 ACM symposium on information, computer and communications security, (pp. 292–299). Paise, R.I., & Vaudenay, S. (2008). Mutual authentication in RFID: Security and privacy. In Proceedings of the 2008 ACM symposium on information, computer and communications security, (pp. 292–299).
10.
Zurück zum Zitat Deng, R. H., Li, Y., Yung, M., & Zhao, Y. (2010). A new framework for RFID privacy. Computer Security-ESORICS, 2010, 1–18. Deng, R. H., Li, Y., Yung, M., & Zhao, Y. (2010). A new framework for RFID privacy. Computer Security-ESORICS, 2010, 1–18.
11.
Zurück zum Zitat Hermans, J., Pashalidis, A., Vercauteren, F., & Preneel, B. (2011). A new RFID privacy model. Computer Security-ESORICS, 2011, 568–587. Hermans, J., Pashalidis, A., Vercauteren, F., & Preneel, B. (2011). A new RFID privacy model. Computer Security-ESORICS, 2011, 568–587.
13.
Zurück zum Zitat Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings National Computer Conference, 48, 313–317. Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings National Computer Conference, 48, 313–317.
14.
Zurück zum Zitat Desmedt, Y. G., & Frankel, Y. (1994). Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM Journal on Discrete Mathematics, 7(4), 667–679.MathSciNetCrossRefMATH Desmedt, Y. G., & Frankel, Y. (1994). Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM Journal on Discrete Mathematics, 7(4), 667–679.MathSciNetCrossRefMATH
15.
Zurück zum Zitat Kurihara, J., Kiyomoto, S., Fukushima, K., & Tanaka, T. (2008). A new (k, n)-threshold secret sharing scheme and its extension. In: T. C. Wu, C. L. Lei, V. Rijmen & D. T. Lee (Eds.), Information security. ISC 2008. Lecture Notes in Computer Science (Vol. 5222, pp. 455–470). Berlin: Springer. Kurihara, J., Kiyomoto, S., Fukushima, K., & Tanaka, T. (2008). A new (k, n)-threshold secret sharing scheme and its extension. In: T. C. Wu, C. L. Lei, V. Rijmen & D. T. Lee (Eds.), Information security. ISC 2008. Lecture Notes in Computer Science (Vol. 5222, pp. 455–470). Berlin: Springer.
16.
Zurück zum Zitat Wang, D., Zhang, L., Ma, N., & Li, X. (2007). Two secret sharing schemes based on Boolean operations. Pattern Recognition, 40(10), 2776–2785.CrossRefMATH Wang, D., Zhang, L., Ma, N., & Li, X. (2007). Two secret sharing schemes based on Boolean operations. Pattern Recognition, 40(10), 2776–2785.CrossRefMATH
17.
Zurück zum Zitat Kardas, S., Celik, S., Yildiz, M., & Levi, A. (2012). PUF-enhanced offline RFID security and privacy. Journal of Network and Computer Applications, 35(6), 2059–2067.CrossRef Kardas, S., Celik, S., Yildiz, M., & Levi, A. (2012). PUF-enhanced offline RFID security and privacy. Journal of Network and Computer Applications, 35(6), 2059–2067.CrossRef
18.
Zurück zum Zitat Kardas, S., Celik, S., Bingol, M.A., Kiraz, M.S., Demirci, H., & Levi, A. (2014). k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions, wireless communications and mobile computing Kardas, S., Celik, S., Bingol, M.A., Kiraz, M.S., Demirci, H., & Levi, A. (2014). k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions, wireless communications and mobile computing
19.
Zurück zum Zitat Sadeghi, A.R., Visconti, I., & Wachsmann, C. (2010). PUF-enhanced RFID security and privacy, Workshop on secure component and system identification (SECSI) Sadeghi, A.R., Visconti, I., & Wachsmann, C. (2010). PUF-enhanced RFID security and privacy, Workshop on secure component and system identification (SECSI)
21.
Zurück zum Zitat Stinson, D. R. (2005). Cryptography: Theory and practice. Boca Raton: CRC press.MATH Stinson, D. R. (2005). Cryptography: Theory and practice. Boca Raton: CRC press.MATH
22.
Zurück zum Zitat Alagheband, M. R., & Aref, M. R. (2014). Simulation based traceability analysis of RFID authentication protocols. Wireless Personal Communications, 77(2), 1019–1038.CrossRef Alagheband, M. R., & Aref, M. R. (2014). Simulation based traceability analysis of RFID authentication protocols. Wireless Personal Communications, 77(2), 1019–1038.CrossRef
23.
Zurück zum Zitat Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security, ACM, 210–219 Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on computer and communications security, ACM, 210–219
24.
Zurück zum Zitat Bassil, R., El-Beaino, W., Itani, W., Kayssi, A., & Chehab, A. (2012). PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol. International Journal of RFID Security and Cryptography, 1(1/2), 58–66. Bassil, R., El-Beaino, W., Itani, W., Kayssi, A., & Chehab, A. (2012). PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol. International Journal of RFID Security and Cryptography, 1(1/2), 58–66.
25.
Zurück zum Zitat Zhuang, X., Zhu, Y., & Chang, C. C. (2014). A new ultralightweight RFID protocol for low-cost tags: \(R^{2} AP\). Wireless Personal Communications, 79(3), 1787–1802.CrossRef Zhuang, X., Zhu, Y., & Chang, C. C. (2014). A new ultralightweight RFID protocol for low-cost tags: \(R^{2} AP\). Wireless Personal Communications, 79(3), 1787–1802.CrossRef
26.
Zurück zum Zitat Dehkordi, M. H., & Farzaneh, Y. (2014). Improvement of the hash-based RFID mutual authentication protocol. Wireless personal communications, 75(1), 219–232.CrossRef Dehkordi, M. H., & Farzaneh, Y. (2014). Improvement of the hash-based RFID mutual authentication protocol. Wireless personal communications, 75(1), 219–232.CrossRef
27.
Zurück zum Zitat Akgn, M., & alayan, M. U. (2015). Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, 32, 32–42.CrossRef Akgn, M., & alayan, M. U. (2015). Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, 32, 32–42.CrossRef
28.
Zurück zum Zitat Asadpour, M., & Dashti, M. T. (2015). Scalable, privacy preserving radiofrequency identification protocol for the internet of things. Concurrency and Computation Practice and Experience, 27(8), 1932–1950.CrossRef Asadpour, M., & Dashti, M. T. (2015). Scalable, privacy preserving radiofrequency identification protocol for the internet of things. Concurrency and Computation Practice and Experience, 27(8), 1932–1950.CrossRef
Metadaten
Titel
Privacy Model for Threshold RFID System Based on PUF
verfasst von
Sonam Devgan Kaul
Amit K. Awasthi
Publikationsdatum
31.01.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-3965-1

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt