Dimitriou密钥演化RFID系统的密码分析

Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li
{"title":"Dimitriou密钥演化RFID系统的密码分析","authors":"Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li","doi":"10.1145/3033288.3033292","DOIUrl":null,"url":null,"abstract":"In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security issues, among which stands the transfer of ownership. Generally speaking, RFID tags can be reused multiple times, and the identity of the owner of a tag can vary in different scenarios. Recently, Tassos Dimitriou published a study that presented several key evolving schemes and discussed the issue of how the ownership of RFID tags could be properly transferred with some security requirements met. Unfortunately, Dimitriou's systems have some security vulnerabilities. In this paper, the authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Cryptanalysis of Dimitriou's Key Evolving RFID Systems\",\"authors\":\"Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li\",\"doi\":\"10.1145/3033288.3033292\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security issues, among which stands the transfer of ownership. Generally speaking, RFID tags can be reused multiple times, and the identity of the owner of a tag can vary in different scenarios. Recently, Tassos Dimitriou published a study that presented several key evolving schemes and discussed the issue of how the ownership of RFID tags could be properly transferred with some security requirements met. Unfortunately, Dimitriou's systems have some security vulnerabilities. In this paper, the authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.\",\"PeriodicalId\":253625,\"journal\":{\"name\":\"International Conference on Network, Communication and Computing\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Network, Communication and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3033288.3033292\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Network, Communication and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3033288.3033292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

近十年来,射频识别技术(RFID)在无线通信环境中蓬勃发展。RFID的应用日趋成熟,已深入到智能建筑、医疗保健、供应链管理等各个领域。然而,随着RFID系统的快速发展,出现了许多安全问题,其中之一就是所有权的转移。一般来说,RFID标签可以多次重复使用,并且标签所有者的身份在不同的场景下可能会有所不同。最近,Tassos Dimitriou发表了一项研究,提出了几个关键的发展方案,并讨论了如何在满足某些安全要求的情况下正确转移RFID标签的所有权。不幸的是,Dimitriou的系统有一些安全漏洞。在本文中,作者指出了Dimitriou的RFID系统的一些弱点,包括基本认证方案的相互认证部分,密钥更新方案的向后隐私问题,以及受控授权和授权恢复的向后隐私问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cryptanalysis of Dimitriou's Key Evolving RFID Systems
In the last decade, the technology of Radio Frequency Identification (RFID) has boomed in the wireless communication environment. Applications of RFID have matured and reached far into various fields such as smart building, healthcare, supply chain management, etc. However, along with the rapid advancement of RFID systems have come many security issues, among which stands the transfer of ownership. Generally speaking, RFID tags can be reused multiple times, and the identity of the owner of a tag can vary in different scenarios. Recently, Tassos Dimitriou published a study that presented several key evolving schemes and discussed the issue of how the ownership of RFID tags could be properly transferred with some security requirements met. Unfortunately, Dimitriou's systems have some security vulnerabilities. In this paper, the authors shall point out some weak-nesses of Dimitriou's RFID systems including the mutual authentication part of the basic authentication scheme, the backward privacy problem of the key update scheme, as well as backward privacy for controlled delegation and authorization recovery.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信