A secure RFID protocol based on insubvertible encryption using guardian proxy

Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Radio frequency identification (RFID) has been widely deployed for manufacturing, supply chain management, etc. Unfortunately, RFID may cause privacy and security problems. To solve these problems, researchers have studied extensively on RFID security systems. Ateniese et al. proposed an RFID protocol using insubvertible encryption based on the universal re-encryption. Although this protocol achieves the integrity of ciphertexts randomized by authorized users, it still leaves security problems. In this paper, we propose a secure RFID protocol based on insubvertible encryption involving guardian proxy. The guardian proxy is a personal RFID-privacy device which may be integrated into cellular phones or PDAs. By introducing the guardian proxy and other basic cryptographic primitives into RFID systems, our protocol is secure against the tag spoofing and swapping attacks. Moreover, our protocol enables ownership transfer.

Original languageEnglish
Title of host publicationARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings
Pages733-740
Number of pages8
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event3rd International Conference on Availability, Security, and Reliability, ARES 2008 - Barcelona, Spain
Duration: Mar 4 2008Mar 7 2008

Publication series

NameARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings

Other

Other3rd International Conference on Availability, Security, and Reliability, ARES 2008
Country/TerritorySpain
CityBarcelona
Period3/4/083/7/08

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'A secure RFID protocol based on insubvertible encryption using guardian proxy'. Together they form a unique fingerprint.

Cite this