Security and privacy protocol for emerging smart RFID applications

The raise of smart RFID technology (i.e. sensor integration to RFID system) has introduced various advantages in the context of location awareness applications, reaching from low cost implementation and maintenance, to its flexibility to support large-scale system. Nevertheless, the use of such technology introduces tremendous security and privacy issues (e.g. unauthorized tracking, information leakage, cloning attack, data manipulation, collision attack, replay attack, Denial-of-Service, etc.). On the other hand, the constrained nature of RFID application makes the security enforcement is more complicated. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Indeed, our proposed solution protects the RFID system from various threats, as well as preserves the privacy by early performing encryption including the identity even before the authentication is started.

[1]  Piotr Szczechowiak,et al.  TinyIBE: Identity-based encryption for heterogeneous sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[2]  Harald Haas,et al.  Proc. of the Wireless Communications and Networking Conference (WCNC) , 2012 .

[3]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[4]  Amit K. Awasthi,et al.  Proxy Blind Signature Scheme , 2003, IACR Cryptol. ePrint Arch..

[5]  Qi Xie,et al.  Improvement of ID-based proxy signature scheme without trusted PKG: Improvement of ID-based proxy signature scheme without trusted PKG , 2009 .

[6]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[7]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[8]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[9]  Li Zhi-bin Efficient Proxy Blind Multi-signature Scheme , 2008 .

[10]  Vladimir Kolesnikov,et al.  Key Exchange Using Passwords and Long Keys , 2006, TCC.

[11]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[12]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[13]  Lan Cai-hui ID-based designated-verifier proxy signature scheme without trusted PKG , 2008 .