Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Published : 2007.09.30

Abstract

Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

Keywords

References

  1. T, McConnel, 'RFID advances bring fundamental changes to security and personal safety,' http://www.iapplianceweb.com/story/OEG20030604 S0047, June 6, 2003
  2. K. Takaragi, M. Usami, R. Imura, R. Itsuki, T. Satoh, 'An ultra small individual recognition security chip,' Micro, IEEE Nov/Dec 2001 Pages 43 - 49, Volume 21, Issue 6 https://doi.org/10.1109/40.977757
  3. MIT Auto-ID Center. http://www.autoidcenter.org Feb 2004
  4. S. Sarma, D. Brock, D. Engels, 'Radio frequency identification and the electronic product code,' Micro, IEEE, vol. 21, no. 6, Nov. - Dec. 2001, pp.50 - 54 https://doi.org/10.1109/40.977758
  5. D. McCullough. RFID tags: Big Brother in small packages. CNet, 13 January 2003. From http://news.com.com/2010-1069-980325.html
  6. Steven A. Weis, 'Security and Privacy in Radio-Frequency Identification Devices' MIT Master of Science Thesis, submitted May 2003
  7. A. Juels, R. Pappu, 'Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.' In R. Wright, ed., Financial Cryptography ' 03. Pringer-Verlag. 2003
  8. J. Hoffstein, J. Pipher, J. H. Silverman, 'NTRU: A Ring-Based Public Key Cryptosystem.' Lecture Notes in Computer Science, 1423:267, 1998
  9. S.A.Weis, S.E.Sarma, R.L. Revest, D.W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems ' accepted for publication to the First International Conference on Security in Pervasive Computing (SPC 2003), March 12-14, 2003
  10. D. Boneh, P. Golle, 'Almost Entirely Correct Mixing With Applications to Voting,' Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp. 68 - 77
  11. S. Sarma, S. Weis, D. Engels, 'Radio-frequency identifiers: Security Risks and Challenges,' CryptoBytes, vol. 6, no. 1, Spring 2003