Presentation is loading. Please wait.

Presentation is loading. Please wait.

多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : 2012.08.31 Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.

Similar presentations


Presentation on theme: "多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : 2012.08.31 Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP."— Presentation transcript:

1 多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : 2012.08.31 Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing

2 多媒體網路安全實驗室 OUTLINE INTRODUCTION 1 RELATED WORKS 2 PROPOSED PROTOCOL 33 SECURITY AND PRIVACY ANALYSIS 44 35 1 EFFICIENCY ANALYSIS CONCLUSION 46

3 多媒體網路安全實驗室 INTRODUCTION 2  Architecture of RFID

4 多媒體網路安全實驗室 3 INTRODUCTION  RF Tag of RFID can be divided into two categories 1. Active RF Tag Need to install the battery. Sense distance is long than passive. 2. Passive RF Tag Doesn’t need to install the battery. Sense distance is short than active.

5 多媒體網路安全實驗室  RFID authentication protocols can be divided into four classes. 1. First - Weis et al. 2. Second – S. A. Weis 3. Third - Tree based protocol 4. Fourth - C. C. Tan RELATED WORKS

6 多媒體網路安全實驗室 5 PROPOSED PROTOCOL  Notations S : The authentication server R i : An RFID reader T j : An RFID tag h(.) : A one-way function f k (.) : A one-way function with a secret key k ⊕ : Bitwise XOR operation

7 多媒體網路安全實驗室 6 PROPOSED PROTOCOL  This proposed protocol can be divided into three phrases. 1. Assumptions 2. Initialization 3. Authentication

8 多媒體網路安全實驗室 PROPOSED PROTOCOL  Assumptions 1. Each tag has enough memory to store a one-way hash function. 2. The hash functions are assumed to be known for the adversary, while the parameters used are secret. 3. Each tag has a rewriteable memory to store the security information. 4. Each tag can generate random numbers and perform hash function operations. 5. The channel between the reader and the authentication server is secure but another is not.

9 多媒體網路安全實驗室 8 PROPOSED PROTOCOL  Initialization S User Special Channel RoRw

10 多媒體網路安全實驗室 9 PROPOSED PROTOCOL  Authentication SRiRi TjTj

11 多媒體網路安全實驗室 10 SECURITY AND PRIVACY ANALYSIS  The analysis can be divided into sixth parts 1. Eavesdropping 2. Tag cloning 3. Tag tracking 4. Replay attack 5. Compromising attack 6. Denial of service attack

12 多媒體網路安全實驗室 11 SECURITY AND PRIVACY ANALYSIS  Eavesdropping SRiRi TjTj

13 多媒體網路安全實驗室 12 SECURITY AND PRIVACY ANALYSIS  Tag cloning 12 SRiRi TjTj

14 多媒體網路安全實驗室 13 SECURITY AND PRIVACY ANALYSIS  Tag tracking 13 SRiRi TjTj

15 多媒體網路安全實驗室 14 SECURITY AND PRIVACY ANALYSIS  Replay attack 14 SRiRi TjTj

16 多媒體網路安全實驗室 15 SECURITY AND PRIVACY ANALYSIS  Compromising attack 15 SRiRi TjTj

17 多媒體網路安全實驗室 16 SECURITY AND PRIVACY ANALYSIS  Denial of service attack 16 SRiRi TjTj

18 多媒體網路安全實驗室 17 EFFICIENCY ANALYSIS

19 多媒體網路安全實驗室 CONCLUSION  In this paper, we proposed a much more efficient authentication protocol utilizing one-way functions only than most of recent protocols.  The server just compute one-way function three times to check the identifier of the tag and its response without any other searching operation.  Our protocol provides a mutual authentication between the reader and the tag. 18

20 多媒體網路安全實驗室


Download ppt "多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : 2012.08.31 Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP."

Similar presentations


Ads by Google