Secure authentication scheme for passive C1G2 RFID tags

sillysepiaΗλεκτρονική - Συσκευές

27 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

74 εμφανίσεις

Secure authentication scheme for passive
C1G2 RFID tags

Source
:

Computer
Networks,

2012

Volume 56, No 1, pp. 273

286

Authors:

M.
Moessner

and
Gul

N. Khan

Speaker:

Yeh
-
Chieh
, Chou

Date:

2012/11/22

Outline


Related works


Notations


YA
-
TRAP
*


Proposed scheme


Notations


Proposed scheme


Security analysis


Conclusions



1

Related works
(
Notations)


𝐊




(1)Tag ID (2)cryptographic key


𝐓
𝟎
,
𝐓
𝐦𝐚


Initial time
-
stamp, the highest possible
time
-
stamp


𝐓
𝐫
,

𝐓
𝐭


Time
-
stamp of reader, time
-
stamp of tag


𝐏𝐑




Denotes the j
-
th

invocation of the PRNG of the tag


 𝐀𝐂




Hash Message Authentication Code


𝐄𝐓
𝐭
,

𝐄𝐓
𝐫


A hash chain that allows
a tag to ascertain that the reader
-
supplied

𝑇
𝑟

is
not too far into the
future


𝐸𝑇
𝑡

=
𝐻
𝑡




=

𝑇
𝑡
𝐼𝑁𝑇

𝐸𝑇
𝑟
=

𝐻
𝑟



𝑟
=

𝑇
𝑟
𝐼𝑁𝑇



INT


The duration of epoch token
(ex :
one
day)

2

Related works
(
YA
-
TRAP*)

Reader



T
r
,
R
r
,
ET
r

Tag



H
id
,
R
t
,
H
auth

MSG

(660)

(660
-
600)

assume INT =30

ν
=(
660
30

600
30
)=2

ET
t
=
H
t
x


t
=
T
t
INT
=
20

H
2
(
H
2
0
)
=
H
22
=
ET
r

T
r
=
11:30 (current

time)

T
t
=11:20

Tag ID

key

ET
r
=
H
r
x


r
=
T
r
INT
=
2
2

ET
r
=
H
2
2

3

Related works
(
YA
-
TRAP*)

Reader



T
r
,
R
r
,
ET
r

Tag



H
id
,
R
t
,
H
auth

MSG

(
T
r


 𝑟
)

T
𝑡




 𝑟

snooped

Adversary

True

4

Proposed scheme(
Notations)


𝐊𝐞

[

]



cryptographic key (
i

is table, j is index)


𝐑
𝒓
𝒕
,
𝐑
𝒕
𝒓


Random
number
𝑅
𝑟

transmit from tag, Random number
𝑅
𝒕

transmit from
reader


C(A||B,
𝑲𝒆𝒚
𝒊
[j])


Encrypt A and B with
 
𝑖



5

Proposed scheme

Tag

Tag ID

𝑻
𝒕

Table

Index

Key

1

0

A

i

0x03

1

0

A

i+1

0x01











2

3

A

n
-
1

0x25

2

3

A

n

0xAF











1

0

B

i

0x03

1

0

B

i+1

0x01











2

3

B

n
-
1

0x25

2

3

B

n

0xAF











Key

Table A

Key Table B

Index

Key

Index

Key

𝐾 

[

]

0x03

𝐾 

[

]

0x03

𝐾 

[

+
1
]

0x01

𝐾 

[

+
1
]

0x01





𝐾 

[

+
2
]

?-

𝐾 

[
𝑛
]

0xAF



0xAF

Server

Key Pairs

6

Proposed scheme

Reader



Tag



m
3
=
C
2

m
4
=
C
3

m
1
=
R
r

m
2
=
C
1
|
|
R
t

Key pair

7

Security
analysis

Protocol

YA
-
TRAP*

Proposed
Scheme

Mutual Authenticated

No

Yes

Forward/Backward Security

Yes

Yes

Dos attack resistance

No

Yes

8

Conclusions


T
he proposed scheme provides
more
security


9