Abstract
Previous and existing RFID systems with security protection have discussed the solution in term of security, trust and privacy in silo. Moreover, security and privacy solutions protect secret data and provide anonymity services for RFID system. Unfortunately, both solutions are not used to verify integrity of the integrated and interconnected platforms. RFID platform without any system integrity verification could be hijacked and adversary could use the infected platform to attack other integrated platforms. This research aims at designing RFID system with a combination approach of security, trust and privacy. The unified combination of security and privacy with trust in this solution compliments each other because integrity report is encrypted by using lightweight-based encryption, encryption key is sealed by using a sealing key of the trusted platform module, and identity of every platform is anonymous and protected by using an anonymizer. This paper presents an implementation of a framework which emulates the real hardware prototype system for RFID with security, trust and privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Dietrich, K.: Anonymous RFID authentication using trusted computing technologies. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 91–102. Springer, Heidelberg (2010)
Kumar, A., Arora, A., Islam, C.J.: Near Field Communication(NFC): An expertise primer. Discovery 2(4), 20–25 (2012)
Dardari, D., D’Errico, R., Roblin, C., Sibille, A., Win, M.Z.: Ultrawide bandwidth RFID: The next generation? Proceedings of the IEEE 98(9), 1570–1582 (2010)
Zou, Z., Baghaei-Nejad, M., Tenhunen, H., Zheng, L.R.: An efficient passive RFID system for ubiquitous identification and sensing using impulse UWB radio. e & I Elektrotechnik und Informationstechnik 124(11), 397–403 (2007)
Grunwald, L.: New attacks against RFID-systems. GmbH Germany (2006)
Rieback, M.R., Simpson, P.N., Crispo, B., Tanenbaum, A.S.: RFID Malware: design principles and examples. Pervasive and Mobile Computing 2(4), 405–426 (2006)
Shankarapani, M.K., Sulaiman, A., Mukkamala, S.: Fragmented malware through RFID and its defenses. Journal in Computing Virology 5(3), 187–198 (2009)
Armstrong, H.L., Forde, P.J.: Internet anonymity practice in computer crime. Information Management and Computer Security 11(5), 209–215 (2003)
Barber, R.: Hacking techniques: The tools that hackers use, and how they are evolving to become more sophisticated. Computer Fraud & Security 2001(3), 9–12 (2001)
Byres, E., Franz, M., Miller, D.: The use of attack trees in assessing vulnerabilities in SCADA systems. In: Proceedings of the International Infrastructure Survivability Workshop (2004)
Hentea, M.: A perspective on security risk management of SCADA control systems. In: Proceedings of ISCA 23rd International Conference on Computers and their Applications, CATA 2008, pp. 222–227 (2008)
Hein, D., Wolkerstorfer, J., Felber, N.: ECC is Ready for RFID – A Proof in Silicon. In: Conference on RFID Security, Budapest, Hungary (2008)
Hermans, J.: Lightweight Public Key Cryptography (Dortoral dissertation, PhD thesis, Katholieke Universiteit Leuven, Leuven, Belgium) (2012)
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)
Deng, G., Li, H., Zhang, Y., Wang, J.: Tree-LSHB+: An LPN-Based Lightweight Mutual Authetication RFID Protocol. Wireless Personal Communications, 1–16 (2013)
El Moustaine, E., Laurent, M.: GPS+: A back-end coupons identification for low-cost RFID. In: Proceedings of the sixth ACM Conference on Security and Privacy in wireless and Mobile Networks, pp. 73–78 (2013)
Atmel Corporation: Innovative IDIC solutions (2007), http://www.atmel.com/dyn/resources/prod_documents/doc4602.pdf
Calypso Networks Association: Web site of Calypso Networks Association (2007), http://www.calypsonet-asso.org/
Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled Security and Privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 134–153. Springer, Heidelberg (2009)
Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 103–111. ACM (2003)
Armknecht, F., Chen, L., Sadeghi, A.-R., Wachsmann, C.: Anonymous Authentication for RFID Systems. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 158–175. Springer, Heidelberg (2010)
Toiruul, B., Lee, K.O.: An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems. International Journal of Computer Science and Network Security 6(9B) (2006)
Fishkin, K.P., Roy, S., Jiang, B.: Some Methods for Privacy in RFID Communication. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 42–53. Springer, Heidelberg (2005)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol. 4809, pp. 781–794. Springer, Heidelberg (2007)
Mubarak, M.F., Manan, J.A., Yahya, S.: Mutual Attestation Using TPM for Trusted RFID Protocol. In: 2nd International Conference on Network Applications, Protocols and Services, NETAPPS 2010, pp. 153–158 (2010)
Soperra, A., Burbridge, T., Boekhuizen, V.: Trusted RFID Readers for Secure Multi-Party Services. In: EU RFID Forum (2007)
Molnar, D., Soppera, A., Wagner, D.: Privacy for RFID through Trusted Computing. In: Proceedings of the 2005 ACM Workshop on Privacy in The Electronic Society, pp. 31–34. ACM (2005)
Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 59–66. IEEE (2005)
Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)
Piramuthu, S.: Protocols for RFID tag/reader authentication. Decision Support Systems 43(4), 897–914 (2007)
Mubarak, M.F., Manan, J.L.A., Yahya, S.: A Unified Model for Security, Trust and Privacy (STP) of RFID System. Journal of Information Assurance and Security 7(3), 119–126 (2012)
Asadpour, M., Dashti, M.T.: A Privacy-friendly RFID Protocol using Reusable Anonymous Tickets. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 206–213 (2011)
Zhou, J., Zhou, Y., Xiao, F., Niu, X.: Mutual Authentication Protocol for Mobile RFID Systems. Journal of Computational Information Systems 8(8), 3261–3268 (2012)
Chen, L., Page, D., Smart, N.P.: On the Design and Implementation of an Efficient DAA Scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 223–237. Springer, Heidelberg (2010)
Henrici, D., Müller, P.: Tackling Security and Privacy Issue in Radio Frequency Identification Devices. In: 2nd International Conference on Prevasive Computing, pp. 149–153. IEEE (2004)
Sumrall, N., Novoa, M.: Trusted Computing Group (TCG) and the TPM 1.2 Specification. Intel Developer Forum 32 (2003)
Batina, L., Lee, Y.K., Seys, S., Singelée, D., Verbauwhede, I.: Extending ECC-based RFID Authentication Protocols to Privacy-Preserving Multi-Party Grouping Proofs. Personal and Ubiquitous Computing 16(3), 323–335 (2012)
Kim, H.W., Lim, S.Y., Lee, H.J.: Symmetric encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security. In: International Conference on Hybrid Information Technology, vol. 2, pp. 718–723 (2006)
Roberts, C.M.: Radio Frequency Identification (RFID). Computer Security 25(1), 18–26 (2006)
Heubner, A., Facchi, C., Janicke, H.: Rifidi Toolkit: Virtually for Testing RFID. In: The 7th International Conference on Systems and Networks Communications, pp. 1–6 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Mubarak, M.F., Manan, JL.A., Yahya, S. (2014). An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M., Küng, J., Thoai, N. (eds) Future Data and Security Engineering. FDSE 2014. Lecture Notes in Computer Science, vol 8860. Springer, Cham. https://doi.org/10.1007/978-3-319-12778-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-12778-1_10
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12777-4
Online ISBN: 978-3-319-12778-1
eBook Packages: Computer ScienceComputer Science (R0)