A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol
Autor: | Albert B. Jeng, Sheng-Hui Chen, Li-Chung Chang |
---|---|
Rok vydání: | 2008 |
Předmět: |
Key-agreement protocol
business.industry Computer science Enterprise information security architecture Computer security computer.software_genre law.invention Public-key cryptography Symmetric-key algorithm Artificial Intelligence Hardware and Architecture law Radio-frequency identification Computer Vision and Pattern Recognition Electrical and Electronic Engineering business Cryptanalysis computer Protocol (object-oriented programming) Software Computer network Anonymity |
Zdroj: | IEICE Transactions on Information and Systems. :1408-1415 |
ISSN: | 1745-1361 0916-8532 |
DOI: | 10.1093/ietisy/e91-d.5.1408 |
Popis: | There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e.g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e.g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain. |
Databáze: | OpenAIRE |
Externí odkaz: |