Docstoc

A lightweight mutual authentication protocol for RFID networks

Document Sample
A lightweight mutual authentication protocol for RFID networks Powered By Docstoc
					A lightweight mutual
authentication protocol for RFID
networks
       2005 IEEE
       Authors : Zongwei Luo, Terry Chan,
                 Jenny S. Li
       Date : 2006/3/21
       Presented by Hung Fei Yau
Outline

   Introduction
   Current solutions approach
   Security scheme requirement
   Proposed lightweight mutual
    authentication protocol
   Conclusion
Introduction

   Two key elements:
    (1) RFID tag, or transponder, carries object-
    identifying data.
    (2) RFID reader, or transceiver, reads and writes
    tag data.
   Privacy issues of a RFID system.
   Reader security issue.
Introduction

   Tag security issue
Current solutions approach

   Extra device added approach
    (a) Faraday cage
    (b) Blocker tag
    (c) Active jamming
   Radio frequency modification approach
    (a) Reader change frequency
    (b) Tag change frequency
   Other approach
    (a) Kill tag
    (b) Hash lock [Unlocked if y=h(x)]
Security scheme requirement

   The focus puts on the security concern
    over a RFID system using passive tag.
    (a) Indistinguishability
    (b) Forward security

   RSA?  Lightweight challenge-
    response protocol
Proposed lightweight mutual
authentication protocol

   Based on hash function [hash chain
    technique]
Proposed lightweight mutual
authentication protocol

   The basic framework of the proposed
    lightweight security protocol
The proposed security
protocol

   Initialization
    (1) Each tag comes with an initial
        secret information S0 & c
        (transaction counter)
    (2) Backend included : S0, Wk,
The proposed security
protocol

   Procedure step
Conclusion

   The proposed scheme can be easily
    adapted to the limited resource criteria
    of a passive tag.

				
DOCUMENT INFO