Design and analysis of secure mechanisms based on tripartite credibility for RFID systems

The number of applications for RFID systems is growing rapidly. Due to the conflict between large-scale use of RFID technology and inadequate security-related research, this paper proposes secure mechanisms based on tripartite credibility consisting of an enhanced security mechanism of LLRP and a tag participation third-party authentication mechanism. This paper first introduces relevant information about RFID systems and then details design and implementation of the proposed secure mechanisms. Finally, this paper evaluates the performance of the proposed mechanisms in terms of storage complexity, communication cost and computational cost and analyzes the security advantages compared to those of previous research. Secure mechanisms based on tripartite credibility for RFID systems are proposed.The secure mechanisms have advantages in storage complexity.The secure mechanisms have advantages in communication and computational cost.The secure mechanisms have a stronger ability to resist threats.

[1]  Sandra Reeder,et al.  Radio Frequency Identification Device (RFID) and Real Time Location Systems (RTLS) Enhance Nursing Care Delivery , 2014 .

[2]  Mohammad Umar Siddiqi,et al.  Performance evaluation of a secure Low Level Reader Protocol(LLRP) connection , 2009 .

[3]  Irfan Syamsuddin,et al.  A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[4]  Mohammad Umar Siddiqi,et al.  Securing a Low Level Reader Protocol Connection and a Study of its Performance , 2009, 2009 International Conference on Future Computer and Communication.

[5]  Elgar Fleisch,et al.  RFID Applications: Interfacing with Readers , 2008, IEEE Software.

[6]  Wenjin Xu,et al.  Research on key Technology of MID , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.

[7]  May Tajima Strategic value of RFID in supply chain management , 2007 .

[8]  Hoopad Mobahat Authentication and lightweight cryptography in low cost RFID , 2010, 2010 2nd International Conference on Software Technology and Engineering.

[10]  Seung-Seok Kang,et al.  Design and Implementation of ALE v1.1 Middleware in RFID systems , 2009, 2009 International Conference on New Trends in Information and Service Science.

[11]  Yunhao Liu,et al.  Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..

[12]  Zhang Xiong,et al.  An Intelligent RFID Reader and its Application in Airport Baggage Handling System , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[14]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Yanjun Wang,et al.  Securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2010, Expert Syst. Appl..

[16]  D. Morgan,et al.  Accuracy of a radiofrequency identification (RFID) badge system to monitor hand hygiene behavior during routine clinical activities. , 2014, American journal of infection control.

[17]  J. Landt,et al.  The history of RFID , 2005, IEEE Potentials.

[18]  Frédéric Thiesse,et al.  LotTrack: RFID-based process control in the semiconductor industry , 2006, IEEE Pervasive Computing.

[19]  Paul Müller,et al.  Providing Security and Privacy in RFID Systems Using Triggered Hash Chains , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[20]  Oum-El-Kheir Aktouf,et al.  An Extended LLRP Model for RFID System Test and Diagnosis , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.

[21]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[22]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[23]  Rabab Kreidieh Ward,et al.  Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols , 2011, CISIS.

[24]  Ciro Cattuto,et al.  Dynamics of Person-to-Person Interactions from Distributed RFID Sensor Networks , 2010, PloS one.

[25]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[26]  Oum-El-Kheir Aktouf,et al.  Monitoring of RFID failures resulting from LLRP misconfigurations , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).