Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although there are lots of work to provide privacy and anonymity, little focus has been given to ensure confidentiality and integrity of RFID tag data. To this end, we propose a lightweight hybrid approach based on stenographic and watermarking to ensure data confidentiality, linkability resistance and integrity on the RFID tags data. The proposed technique is capable of tampered data recovering and restoring for RFID tag. It has been validated and tested on EPC class 1 gen2 tags.

[1]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[2]  Dong Hoon Lee,et al.  Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.

[3]  Kevin Curran,et al.  Tamper Detection for low cost RFID Tags: Using Watermarking with Chaotic Mapping , 2011 .

[4]  Morshed U. Chowdhury,et al.  Mutual authentication with malware protection for a RFID system , 2010, ICIT 2010.

[5]  V. Potdar,et al.  Tamper Detection in RFID Tags using Fragile Watermarking , 2006, 2006 IEEE International Conference on Industrial Technology.

[6]  Jemal H. Abawajy Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.

[7]  V. Potdar,et al.  Recovering and Restoring Tampered RFID Data using Steganographic Principles , 2006, 2006 IEEE International Conference on Industrial Technology.

[8]  Kevin Curran,et al.  A Watermarking Based Tamper Detection Solution for RFID Tags , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[9]  J. Mitsugi,et al.  A Tamper Detection Method for RFID Tag Data , 2008, 2008 IEEE International Conference on RFID.

[10]  Maurizio Rebaudengo,et al.  Tampering in RFID: A Survey on Risks and Defenses , 2010, Mob. Networks Appl..

[11]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.