A Novel Coding Scheme for Secure Communications in Distributed RFID Systems

Privacy protection is the primary concern when RFID applications are deployed in our daily lives. Due to the computational power constraints of passive tags, non-encryption-based singulation protocols have been recently developed, in which wireless jamming is used. However, the existing private tag access protocols without shared secrets rely on impractical physical layer assumptions, and thus they are difficult to deploy. To tackle this issue, we first redesign the architecture of RFID system by dividing an RF reader into two different devices, an RF activator and a trusted shield device (TSD). Then, we propose a novel coding scheme, namely Random Flipping Random Jamming (RFRJ), to protect tags' content. Unlike the past work, the proposed singulation protocol utilizes only the physical layer techniques that are already implemented. Analyses and simulation results validate our distributed architecture with the RFRJ coding scheme, which defends tags' privacy against various adversaries including the random guessing attack, correlation attack, ghost-and-leech attack, and eavesdropping.

[1]  Danilo De Donno,et al.  Challenge: towards distributed RFID sensing with software-defined radio , 2010, MobiCom.

[2]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[3]  Anish Arora,et al.  Capabilities of Low-Power Wireless Jammers , 2009, IEEE INFOCOM 2009.

[4]  Tieyan Li,et al.  Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[5]  Byeong-Hee Roh,et al.  Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy , 2008, IEICE Trans. Commun..

[6]  Yingjiu Li,et al.  Protecting RFID communications in supply chains , 2007, ASIACCS '07.

[7]  Jaideep Srivastava,et al.  Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification , 2007, IEEE Transactions on Parallel and Distributed Systems.

[8]  Sheikh Iqbal Ahamed,et al.  AnonPri: An efficient anonymous private authentication protocol , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[9]  Kazuya Sakai,et al.  Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel , 2013, IEEE Transactions on Computers.

[10]  Bryan Parno,et al.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.

[11]  W. B. Lee,et al.  Design of a RFID case-based resource management system for warehouse operations , 2005, Expert Syst. Appl..

[12]  J. B. Wilker An extremum problem for hypercubes , 1996 .

[13]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Tadayoshi Kohno,et al.  RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.

[15]  Lifeng Sang,et al.  Designing Physical Primitives For Secure Communication In Wireless Sensor Networks , 2010 .

[16]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[17]  Anish Arora,et al.  A shared-secret free security infrastructure for wireless networks , 2012, TAAS.

[18]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[19]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[20]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[21]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.