4.2 Replay Attacks
A reader can use the same Credential repeatedly
authentication until the measurement time expires.
Ways to prevent the replay attacks are measurement
time of location that serves as a timestamp and ran-
dom nonce values that change in every tag query.
In the proposed scheme the reader id contain in
Credential. The illegitimate reader cannot eavesdrop
and use a credential intended for another reader. And
the channels between reader and back-end server are
secure, only legitimate reader can authenticate.
4.3 Traceability
If tag id is sent in clear text or the tag responds to the
reader’s queries always in the same way, an attacker
can track the tags by the message. In the proposed
scheme the tag id is encrypted in Credential. The tag
id and the credential are both with random nonce. So
tag id and the responds to the reader’s queries change
in every time. Reader cannot track the tags by the
message.
4.4 Dynamic Join-leave
The schemes proposed by Kaya et al. and previ-
ous other author have a weaknesses. Their proposed
scheme cannot dynamically join and leave. In Kaya
et al. scheme, they assume the back-end servers are
trusted in their model, and the back-end servers share
the same public key and private key. This was not
scalable. If an attacker is added to this groups to ob-
tain the private key, the system will collapse. All mes-
sages can be decrypted. Otherwise, back-end servers
store different private keys. When a new purpose is
added to the groups, in the public key encryption al-
gorithms all of the public key must be renewed. Tags
should not select the application the tags want to add.
Since a new application joins and tags use new a pub-
lic key to encrypt messages. All of the back-end
servers also decrypt messages.
However, in our scheme. We use mod function to
solve key management of Kaya et al.’s scheme. Our
scheme use CA the trust server register all tags keys
U. When server will authentication a tag, and server
computes K = U mod H(K
i
k r) to verify K. If K is
authorized by back-end server, then back-end server
sends tag data to reader. So in our scheme, authenti-
cation key can dynamically join-and-leave.
The security comparisons among Kaya et al.’s
scheme and our scheme are listed in Table 1.
Table 1: The security scheme comparison among Kaya et
al.
Security Kaya et al.’s scheme Our scheme
Impersonation attacks
Replay attacks
Traceability
Dynamic Join-Leave ×
5 CONCLUSIONS
The proposed scheme presents an application on
multi-purpose scheme. In accordance with the needs
of tag dynamically add and remove different applica-
tions. While the U.S. may lead to, other than Kaya et
al.’s scheme more computing schemes, however, our
scheme can solve the disadvantage that the user can
not add and remove. Furthermore, our scheme is also
able to satisfy all the security requirements of Kaya et
al.’s scheme.
REFERENCES
Avoine, G., Dysli, E., and Oechslin, P., 2006. Reducing
time complexity in RFID systems. Lecture Notes in
Computer Science - Selected Areas in Cryptography
2006, 3897:291–306.
Dimitriou, T., 2005. A lightweight RFID protocol to pro-
tect against traceability and cloning attacks. In Pro-
ceedings of IEEE First International Conference on
Security and Privacy for Emerging Areas in Commu-
nications Networks, pages 59–66, Athens, Greece.
Feldhofer, M., Dominikus, S., and Wolkerstorfer, J., 2004.
Strong authentication for RFID systems using the
AES algorithm. Lecture Notes in Computer Science
- Cryptographic Hardware and Embedded Systems -
CHES 2004, 3156:357–370.
Kaya, S. V., Savas¸, E., Levi, A., and Erc¸etin, O., 2009.
Public key cryptography based privacy preserving
multi-context RFID infrastructure. Ad Hoc Networks,
7:136–152.
Menezes, A., van Oorschot, P., and Vanstone, S., 1997.
Handbook of Applied Cryptography.
Molnar, D. and Wagner, D., 2004. Privacy and security
in library RFID: Issues, practices, and architectures.
In Proceedings of 11th ACM conference on Computer
and communications security, pages 210–219, Wash-
ington, DC, USA.
Ohkubo, M., Suzuki, K., and Kinoshita, S., 2003. Cryp-
tographic approach to privacy-friendly tags. In RFID
Privacy Workshop.
Weis, S. A., Sarma, S. E., Rivest, R. L., and Engels, D. W.,
2004. Security and privacy, aspects of low-cost ra-
dio frequency identification systems. Lecture Notes in
Computer Science - Security in Pervasive Computing
2003, 2802:50–59.
PECCS 2011 - International Conference on Pervasive and Embedded Computing and Communication Systems
540