首页> 外文OA文献 >Addressing Security and Privacy Issues in Low-Cost RFID Systems
【2h】

Addressing Security and Privacy Issues in Low-Cost RFID Systems

机译:解决低成本RFID系统中的安全性和隐私问题

摘要

Radio Frequency Identification (RFID) systems are being used in numerous applications such as transportation ticketing, animal tracking, supply chain management, medical records, electronic passports and identity cards. These systems consist of three main components, namely: server, reader and tag. A tag is a small microchip with antenna attached to an item which needs identification. A reader scans a tag(s) and collects the identification information. This information is then passed on to a server by the reader for further operations.Providing security and preserving privacy of these systems come with a cost. In sensitive applications such as e-passports, the embedded tags are resourceful enough to accommodate standard cryptographic functionality. These resourceful tags are high-cost. However in the most widely deployed RFID systems, such as in supply chain management of daily consumer goods, it is not feasible to use such high-cost tags. Therefore the tags used in these applications are low-cost tags which are constrained in their resources. Since these tags cannot afford the luxury of conventional cryptographic primitives, low-cost RFID systems are prone to both passive as well as active adversaries. Some of the typical threats related to an RFID system include tag cloning, impersonation, replay, relay, de-synchronization, DoS, content privacy leakage, tracing and tracking attacks, etc. Therefore it is imperative to think out of the box to provide security and privacy to these low-cost RFID systems.This thesis makes six contributions in this regard. In the first and second contribution, very basic low-cost tags are considered. These tags are very constrained with respect to their resources. To secure such tags, researchers have proposed ultra-lightweight mutual authentication protocols (UMAPs). First we demonstrate multiple attacks in detail on two of such UMAPs. Then we carry out analysis of existing UMAPs and highlight weaknesses. We also propose a new UMAP which overcomes the weaknesses of existing discussed schemes.The next three contributions focus on the most widely used application of RFIDsystems, supply chain management. This application generally uses a standard EPC-global Class-1 Gen-2 (EPCC1G2). We contribute by first proposing a scheme which provides security and privacy to tagged items throughout a supply chain cycle with online as well as offline readers. Then we focus our work on the counterfeit problem in supply chain management, which causes huge losses to businesses. We propose a hierarchical anti-counterfeit mechanism to counter the problem of counterfeiting during the supply chain cycle. Finally we devise a framework to provide an anti-counterfeiting feature to individual customers who cannot afford the luxury of standard readers and access to a back-end database server.Lastly we discuss the problem of ownership transfer in RFID systems. Since tagstravel to different geographic locations, there is a need of ownership transfer, where an owner is an entity which can interact with the tag using a shared secret key. A simple ownership transfer involves transfer of a shared secret key from old owner to new owner. This raises concerns where an old owner would retain a copy of the key and can still interact with the tag even after its ownership is revoked. Similarly, if the key is not changed before transfer, a new owner can trace past transactions of an old owner. We propose a secure ownership transfer scheme which meets certain requirements. We further elaborate on additional properties required to achieve a robust ownershiptransfer process.
机译:射频识别(RFID)系统被用于许多应用中,例如运输票务,动物追踪,供应链管理,病历,电子护照和身份证。这些系统由三个主要组件组成,即:服务器,读取器和标签。标签是一个带有天线的小型微芯片,需要识别。读取器扫描标签并收集标识信息。然后,阅读器会将这些信息传递到服务器上,以进行进一步的操作。提供这些系统的安全性和保护隐私需要付出一定的代价。在诸如电子护照之类的敏感应用中,嵌入式标签足够灵活,可以容纳标准的密码功能。这些足智多谋的标签是高成本的。但是,在部署最广泛的RFID系统中,例如日常消费品的供应链管理中,使用这种高成本标签是不可行的。因此,这些应用中使用的标签是低成本标签,其资源受到限制。由于这些标签无法承受传统密码原语的奢侈,因此低成本RFID系统容易受到被动和主动对手的攻击。与RFID系统相关的一些典型威胁包括标签克隆,假冒,重播,中继,去同步,DoS,内容隐私泄漏,跟踪和跟踪攻击等。因此,有必要开箱考虑以提供安全性。这些低成本RFID系统的安全性和隐私性。本文在这方面做出了六点贡献。在第一和第二贡献中,考虑了非常基本的低成本标签。这些标签的资源非常有限。为了保护此类标签,研究人员提出了超轻量级相互认证协议(UMAP)。首先,我们详细演示了对其中两个UMAP的多次攻击。然后,我们对现有的UMAP进行分析,并指出不足之处。我们还提出了一种新的UMAP,该UMAP克服了现有讨论的方案的弱点。接下来的三篇文章重点介绍了RFID系统应用最广泛的应用,即供应链管理。此应用程序通常使用标准的EPC全局Class 1 Gen-2(EPCC1G2)。我们首先提出一种方案,为在线和离线阅读器在整个供应链周期内为带标签的物品提供安全性和隐私性。然后,我们将工作重点放在供应链管理中的假冒问题上,这会给企业造成巨大损失。我们提出了一种分层的防伪机制来应对供应链周期中的伪造问题。最后,我们设计了一个框架,为无法负担标准阅读器费用和无法访问后端数据库服务器的个人客户提供防伪功能。最后,我们讨论了RFID系统中的所有权转移问题。由于标签行进到不同的地理位置,因此需要所有权转移,其中所有者是可以使用共享密钥与标签进行交互的实体。简单的所有权转移涉及将共享密钥从旧所有者转移到新所有者。这引起了一个担忧,即旧所有者将保留密钥的副本,并且即使在其所有权被撤销后仍可以与标签交互。同样,如果密钥在转移前未更改,则新所有者可以跟踪旧所有者的过去交易。我们提出了一种满足某些要求的安全所有权转让计划。我们进一步详细说明了实现稳健的所有权转让流程所需的其他属性。

著录项

  • 作者

    Bilal Zeeshan;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号