Session-based security enhancement of RFID systems for emerging open-loop applications
Radio frequency identification (RFID) is an important technique used for automatic identification and data capture. In recent years, low-cost RFID tags have been used in many open-loop applications beyond supply chain management, such as the tagging of the medicine, clothes, and belongings after the...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Springer London
2016
|
Online Access: | http://hdl.handle.net/1721.1/103797 https://orcid.org/0000-0003-2812-039X |
_version_ | 1826214098653675520 |
---|---|
author | Wang, Junyu Floerkemeier, Christian Sarma, Sanjay Emani |
author2 | Massachusetts Institute of Technology. Department of Mechanical Engineering |
author_facet | Massachusetts Institute of Technology. Department of Mechanical Engineering Wang, Junyu Floerkemeier, Christian Sarma, Sanjay Emani |
author_sort | Wang, Junyu |
collection | MIT |
description | Radio frequency identification (RFID) is an important technique used for automatic identification and data capture. In recent years, low-cost RFID tags have been used in many open-loop applications beyond supply chain management, such as the tagging of the medicine, clothes, and belongings after the point of sales. At the same time, with the development of semiconductor industry, handheld terminals and mobile phones are becoming RFID-enabled. Unauthorized mobile RFID readers could be abused by the malicious hackers or curious common people. Even for authorized RFID readers, the ownership of the reader can be transferred and the owners of the authorized mobile reader may not be always reliable. The authorization and authentication of the mobile RFID readers need to take stronger security measures to address the privacy or security issues that may arise in the emerging open-loop applications. In this paper, the security demands of RFID tags in emerging open-loop applications are summarized, and two example protocols for authorization, authentication and key establishment based on symmetric cryptography are presented. The proposed protocols adopt a timed-session-based authorization scheme, and all reader-to-tag operations are authorized by a trusted third party using a newly defined class of timed sessions. The output of the tags is randomized to prevent unauthorized tracking of the RFID tags. An instance of the protocol A is implemented in 0.13-μm CMOS technology, and the functions are verified by field programmable gate array. The baseband consumes 44.0 μW under 1.08 V voltage and 1.92 MHz frequency, and it has 25,067 gate equivalents. The proposed protocols can successfully resist most security threats toward open-loop RFID systems except physical attacks. The timing and scalability of the two protocols are discussed in detail. |
first_indexed | 2024-09-23T15:59:47Z |
format | Article |
id | mit-1721.1/103797 |
institution | Massachusetts Institute of Technology |
language | English |
last_indexed | 2024-09-23T15:59:47Z |
publishDate | 2016 |
publisher | Springer London |
record_format | dspace |
spelling | mit-1721.1/1037972022-09-29T17:34:15Z Session-based security enhancement of RFID systems for emerging open-loop applications Wang, Junyu Floerkemeier, Christian Sarma, Sanjay Emani Massachusetts Institute of Technology. Department of Mechanical Engineering Sarma, Sanjay Emani Radio frequency identification (RFID) is an important technique used for automatic identification and data capture. In recent years, low-cost RFID tags have been used in many open-loop applications beyond supply chain management, such as the tagging of the medicine, clothes, and belongings after the point of sales. At the same time, with the development of semiconductor industry, handheld terminals and mobile phones are becoming RFID-enabled. Unauthorized mobile RFID readers could be abused by the malicious hackers or curious common people. Even for authorized RFID readers, the ownership of the reader can be transferred and the owners of the authorized mobile reader may not be always reliable. The authorization and authentication of the mobile RFID readers need to take stronger security measures to address the privacy or security issues that may arise in the emerging open-loop applications. In this paper, the security demands of RFID tags in emerging open-loop applications are summarized, and two example protocols for authorization, authentication and key establishment based on symmetric cryptography are presented. The proposed protocols adopt a timed-session-based authorization scheme, and all reader-to-tag operations are authorized by a trusted third party using a newly defined class of timed sessions. The output of the tags is randomized to prevent unauthorized tracking of the RFID tags. An instance of the protocol A is implemented in 0.13-μm CMOS technology, and the functions are verified by field programmable gate array. The baseband consumes 44.0 μW under 1.08 V voltage and 1.92 MHz frequency, and it has 25,067 gate equivalents. The proposed protocols can successfully resist most security threats toward open-loop RFID systems except physical attacks. The timing and scalability of the two protocols are discussed in detail. 2016-07-28T18:31:51Z 2016-07-28T18:31:51Z 2014-08 2014-02 2016-05-23T12:08:45Z Article http://purl.org/eprint/type/JournalArticle 1617-4909 1617-4917 http://hdl.handle.net/1721.1/103797 Wang, Junyu, Christian Floerkemeier, and Sanjay E. Sarma. “Session-Based Security Enhancement of RFID Systems for Emerging Open-Loop Applications.” Personal and Ubiquitous Computing 18.8 (2014): 1881–1891. https://orcid.org/0000-0003-2812-039X en http://dx.doi.org/10.1007/s00779-014-0788-x Personal and Ubiquitous Computing Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Springer-Verlag London application/pdf Springer London Springer London |
spellingShingle | Wang, Junyu Floerkemeier, Christian Sarma, Sanjay Emani Session-based security enhancement of RFID systems for emerging open-loop applications |
title | Session-based security enhancement of RFID systems for emerging open-loop applications |
title_full | Session-based security enhancement of RFID systems for emerging open-loop applications |
title_fullStr | Session-based security enhancement of RFID systems for emerging open-loop applications |
title_full_unstemmed | Session-based security enhancement of RFID systems for emerging open-loop applications |
title_short | Session-based security enhancement of RFID systems for emerging open-loop applications |
title_sort | session based security enhancement of rfid systems for emerging open loop applications |
url | http://hdl.handle.net/1721.1/103797 https://orcid.org/0000-0003-2812-039X |
work_keys_str_mv | AT wangjunyu sessionbasedsecurityenhancementofrfidsystemsforemergingopenloopapplications AT floerkemeierchristian sessionbasedsecurityenhancementofrfidsystemsforemergingopenloopapplications AT sarmasanjayemani sessionbasedsecurityenhancementofrfidsystemsforemergingopenloopapplications |