Key search and adaptation based on association rules for backward secrecy

Static storage of decryption keys in RFID tags creates a security issue particularly when some of these tags are compromised. To address this problem, a framework is proposed in which these tags search and compute decryption keys based on specific intrinsic association rules embedded in the tags, which feed on publicly known broadcast messages transmitted by the centre. This association rule is nothing but a circular linked list which connects a set of T tokens, in some random order. To facilitate backward secrecy, we also propose a rule adaptation methodology based on random deletions within this circular linked list triggered by random numbers, sent by the centre. We have shown theoretically that the search space for tags in possession of the actual keys is linear in the number of tokens contained in the association rule i.e. O(T ), while the search space for eavesdropping tags increases considerably to O(Tr), where r is centre-defined as the length of the footprint, within a circular linked list. Tradeoffs which involve balancing the extent of backward secrecy with network lifetime, are discussed.

[1]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[2]  Claude Castelluccia,et al.  Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Marek Klonowski,et al.  Forward-Secure Key Evolution in Wireless Sensor Networks , 2007, CANS.

[5]  Silvio Micali,et al.  Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.

[6]  Douglas R. Stinson,et al.  Key Refreshing in Wireless Sensor Networks , 2008, ICITS.

[7]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Yang Xiao,et al.  Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[9]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[10]  Zhao Fang,et al.  Research and Realization on the Model of Neonates Surveillance System Based on RFID , 2009, 2009 International Conference on Information Technology and Computer Science.

[11]  Marek Klonowski,et al.  Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks , 2014, TOSN.

[12]  Tanmoy Kanti Das,et al.  Diverging Keys in Wireless Sensor Networks , 2006, ISC.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.