Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System

  • Conference paper
Future Data and Security Engineering (FDSE 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8860))

Included in the following conference series:

Abstract

Previous and existing RFID systems with security protection have discussed the solution in term of security, trust and privacy in silo. Moreover, security and privacy solutions protect secret data and provide anonymity services for RFID system. Unfortunately, both solutions are not used to verify integrity of the integrated and interconnected platforms. RFID platform without any system integrity verification could be hijacked and adversary could use the infected platform to attack other integrated platforms. This research aims at designing RFID system with a combination approach of security, trust and privacy. The unified combination of security and privacy with trust in this solution compliments each other because integrity report is encrypted by using lightweight-based encryption, encryption key is sealed by using a sealing key of the trusted platform module, and identity of every platform is anonymous and protected by using an anonymizer. This paper presents an implementation of a framework which emulates the real hardware prototype system for RFID with security, trust and privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Dietrich, K.: Anonymous RFID authentication using trusted computing technologies. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 91–102. Springer, Heidelberg (2010)

    Google Scholar 

  3. Kumar, A., Arora, A., Islam, C.J.: Near Field Communication(NFC): An expertise primer. Discovery 2(4), 20–25 (2012)

    Google Scholar 

  4. Dardari, D., D’Errico, R., Roblin, C., Sibille, A., Win, M.Z.: Ultrawide bandwidth RFID: The next generation? Proceedings of the IEEE 98(9), 1570–1582 (2010)

    Article  Google Scholar 

  5. Zou, Z., Baghaei-Nejad, M., Tenhunen, H., Zheng, L.R.: An efficient passive RFID system for ubiquitous identification and sensing using impulse UWB radio. e & I Elektrotechnik und Informationstechnik 124(11), 397–403 (2007)

    Article  Google Scholar 

  6. Grunwald, L.: New attacks against RFID-systems. GmbH Germany (2006)

    Google Scholar 

  7. Rieback, M.R., Simpson, P.N., Crispo, B., Tanenbaum, A.S.: RFID Malware: design principles and examples. Pervasive and Mobile Computing 2(4), 405–426 (2006)

    Article  Google Scholar 

  8. Shankarapani, M.K., Sulaiman, A., Mukkamala, S.: Fragmented malware through RFID and its defenses. Journal in Computing Virology 5(3), 187–198 (2009)

    Article  Google Scholar 

  9. Armstrong, H.L., Forde, P.J.: Internet anonymity practice in computer crime. Information Management and Computer Security 11(5), 209–215 (2003)

    Article  Google Scholar 

  10. Barber, R.: Hacking techniques: The tools that hackers use, and how they are evolving to become more sophisticated. Computer Fraud & Security 2001(3), 9–12 (2001)

    Article  Google Scholar 

  11. Byres, E., Franz, M., Miller, D.: The use of attack trees in assessing vulnerabilities in SCADA systems. In: Proceedings of the International Infrastructure Survivability Workshop (2004)

    Google Scholar 

  12. Hentea, M.: A perspective on security risk management of SCADA control systems. In: Proceedings of ISCA 23rd International Conference on Computers and their Applications, CATA 2008, pp. 222–227 (2008)

    Google Scholar 

  13. Hein, D., Wolkerstorfer, J., Felber, N.: ECC is Ready for RFID – A Proof in Silicon. In: Conference on RFID Security, Budapest, Hungary (2008)

    Google Scholar 

  14. Hermans, J.: Lightweight Public Key Cryptography (Dortoral dissertation, PhD thesis, Katholieke Universiteit Leuven, Leuven, Belgium) (2012)

    Google Scholar 

  15. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Deng, G., Li, H., Zhang, Y., Wang, J.: Tree-LSHB+: An LPN-Based Lightweight Mutual Authetication RFID Protocol. Wireless Personal Communications, 1–16 (2013)

    Google Scholar 

  17. El Moustaine, E., Laurent, M.: GPS+: A back-end coupons identification for low-cost RFID. In: Proceedings of the sixth ACM Conference on Security and Privacy in wireless and Mobile Networks, pp. 73–78 (2013)

    Google Scholar 

  18. Atmel Corporation: Innovative IDIC solutions (2007), http://www.atmel.com/dyn/resources/prod_documents/doc4602.pdf

  19. Calypso Networks Association: Web site of Calypso Networks Association (2007), http://www.calypsonet-asso.org/

  20. Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled Security and Privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 134–153. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  21. Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 103–111. ACM (2003)

    Google Scholar 

  22. Armknecht, F., Chen, L., Sadeghi, A.-R., Wachsmann, C.: Anonymous Authentication for RFID Systems. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 158–175. Springer, Heidelberg (2010)

    Google Scholar 

  23. Toiruul, B., Lee, K.O.: An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems. International Journal of Computer Science and Network Security 6(9B) (2006)

    Google Scholar 

  24. Fishkin, K.P., Roy, S., Jiang, B.: Some Methods for Privacy in RFID Communication. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 42–53. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  25. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol. 4809, pp. 781–794. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  26. Mubarak, M.F., Manan, J.A., Yahya, S.: Mutual Attestation Using TPM for Trusted RFID Protocol. In: 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010, pp. 153–158 (2010)

    Google Scholar 

  27. Soperra, A., Burbridge, T., Boekhuizen, V.: Trusted RFID Readers for Secure Multi-Party Services. In: EU RFID Forum (2007)

    Google Scholar 

  28. Molnar, D., Soppera, A., Wagner, D.: Privacy for RFID through Trusted Computing. In: Proceedings of the 2005 ACM Workshop on Privacy in The Electronic Society, pp. 31–34. ACM (2005)

    Google Scholar 

  29. Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 59–66. IEEE (2005)

    Google Scholar 

  30. Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  31. Piramuthu, S.: Protocols for RFID tag/reader authentication. Decision Support Systems 43(4), 897–914 (2007)

    Article  Google Scholar 

  32. Mubarak, M.F., Manan, J.L.A., Yahya, S.: A Unified Model for Security, Trust and Privacy (STP) of RFID System. Journal of Information Assurance and Security 7(3), 119–126 (2012)

    Google Scholar 

  33. Asadpour, M., Dashti, M.T.: A Privacy-friendly RFID Protocol using Reusable Anonymous Tickets. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 206–213 (2011)

    Google Scholar 

  34. Zhou, J., Zhou, Y., Xiao, F., Niu, X.: Mutual Authentication Protocol for Mobile RFID Systems. Journal of Computational Information Systems 8(8), 3261–3268 (2012)

    Google Scholar 

  35. Chen, L., Page, D., Smart, N.P.: On the Design and Implementation of an Efficient DAA Scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 223–237. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  36. Henrici, D., Müller, P.: Tackling Security and Privacy Issue in Radio Frequency Identification Devices. In: 2nd International Conference on Prevasive Computing, pp. 149–153. IEEE (2004)

    Google Scholar 

  37. Sumrall, N., Novoa, M.: Trusted Computing Group (TCG) and the TPM 1.2 Specification. Intel Developer Forum 32 (2003)

    Google Scholar 

  38. Batina, L., Lee, Y.K., Seys, S., Singelée, D., Verbauwhede, I.: Extending ECC-based RFID Authentication Protocols to Privacy-Preserving Multi-Party Grouping Proofs. Personal and Ubiquitous Computing 16(3), 323–335 (2012)

    Article  Google Scholar 

  39. Kim, H.W., Lim, S.Y., Lee, H.J.: Symmetric encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security. In: International Conference on Hybrid Information Technology, vol. 2, pp. 718–723 (2006)

    Google Scholar 

  40. Roberts, C.M.: Radio Frequency Identification (RFID). Computer Security 25(1), 18–26 (2006)

    Article  Google Scholar 

  41. Heubner, A., Facchi, C., Janicke, H.: Rifidi Toolkit: Virtually for Testing RFID. In: The 7th International Conference on Systems and Networks Communications, pp. 1–6 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Mubarak, M.F., Manan, JL.A., Yahya, S. (2014). An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M., Küng, J., Thoai, N. (eds) Future Data and Security Engineering. FDSE 2014. Lecture Notes in Computer Science, vol 8860. Springer, Cham. https://doi.org/10.1007/978-3-319-12778-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12778-1_10

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12777-4

  • Online ISBN: 978-3-319-12778-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics