Active RFID System with Cryptography and Authentication Mechanisms

Radio frequency identification (RFID) systems have recently been used in a large number of applications. Security and privacy issues have also imposed significant chal- lenges on these systems. Cryptography and authentication protocols have been utilized to effectively solve the security and privacy problems in RFID systems. In this paper, we integrate public key encryption, embedded computation, and wire- less communication technologies into the active RFID system that we proposed with cryptography and authentication mechanisms. In our proposed active RFID system, a se- cure RFID Tag intermittently transmits cipher text to a RFID Reader which then trans- mits in multi-hop relaying to a back-end platform to perform data comparison for authen- tication. In addition, the digital signature scheme - Tame Transformation Signatures (TTS) has the advantages of high security, high-speed key generation, signature, and suitability to embedded systems and is thus suitable to be used in our authentication sys- tem. It is used in our proposed system to protect the plain text. The TTS algorithm is from the family of asymmetric public key systems and thus has superiority such as better security, fast key generation, complex algorithm, and low signature delay. The TTS algo- rithm can thus encrypt data and perform authentication more effectively in active RFID systems. We have three major contributions in this paper. The first is to fully design and im- plement an active RFID system which includes active Tags and Readers. In our system, the Tag can stand by and keep working in long term after getting started. The second is to successfully implement a proposed active RFID system with TTS cryptography and au- thentication mechanisms to protect the content in tags to ensure the security in multi-hop transmission. The last is to adopt multi-hop relays to extend distance between Readers.

[1]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[2]  Serge Vaudenay RFID Privacy Based on Public-Key Cryptography , 2006, ICISC.

[3]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[4]  Dave Evans,et al.  Qualifying Information Leakage in Tree-Based Hash Protocols , 2012 .

[5]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[6]  Selwyn Piramuthu,et al.  Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[7]  Patrick Chi-leung Hui,et al.  Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..

[8]  Mike Burmester,et al.  Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.

[9]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[10]  Andrew S. Tanenbaum,et al.  A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.

[11]  Ivan Damgård,et al.  RFID Security: Tradeoffs between Security and Efficiency , 2008, CT-RSA.

[12]  Claude Castelluccia,et al.  Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.

[13]  T. T. Moh,et al.  A public key system with signature and master key functions , 1999 .

[14]  Bo-Yin Yang,et al.  TTS: Rank Attacks in Tame-Like Multivariate PKCs , 2004, IACR Cryptol. ePrint Arch..

[15]  Bo-Yin Yang,et al.  A More Secure and Efficacious TTS Signature Scheme , 2003, ICISC.

[16]  Raphael C.-W. Phan,et al.  Privacy of Recent RFID Authentication Protocols , 2008, ISPEC.

[17]  Akashi Satoh,et al.  A Scalable Dual-Field Elliptic Curve Cryptographic Processor , 2003, IEEE Trans. Computers.

[18]  Sandeep Sadanandan,et al.  Light Weight Cryptography and Applications , 2008 .

[19]  Chen-Mou Cheng,et al.  Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.

[20]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[21]  John Ayoade,et al.  Security implications in RFID and authentication processing framework , 2006, Comput. Secur..

[22]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[23]  Whitfield Diffie,et al.  Analysis of a Public Key Approach Based on Polynomial Substitution , 1985, CRYPTO.