{"title":"安全,快速丢失RFID标签识别轻量MAC和无速率编码","authors":"Kentaroh Toyoda, I. Sasase","doi":"10.1109/ICCW.2015.7247580","DOIUrl":null,"url":null,"abstract":"The realtime identification of missing items, e.g., valuables or confidential documents in shops and warehouses, is one of the most important system. Although many RFID-based schemes that quickly identify missing tag-attached items are proposed, most of the schemes overlooks the possibility of the internal crime. If a person controls an untrusted reader, he/she can freely forge responses from tags and steal items without being detected. In this paper, we propose a secure and fast missing tags identification against both the internal and external attackers. Our scheme first identifies tags stolen by an external attacker with a channel estimation based scheme. Then, our scheme lets tags send cryptographically generated responses, which are socalled MAC (Message Authentication Code), and verifies them to identify stolen tags by an internal attacker. In order to shorten the time to collect responses, our scheme lets multiple tags transmit responses simultaneously and decodes them by leveraging the estimated channels. By the security analysis and the computer simulation, we show the effectiveness of our scheme.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"53 1","pages":"2659-2664"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure and fast missing RFID tags identification with lightweight MAC and rateless coding\",\"authors\":\"Kentaroh Toyoda, I. Sasase\",\"doi\":\"10.1109/ICCW.2015.7247580\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The realtime identification of missing items, e.g., valuables or confidential documents in shops and warehouses, is one of the most important system. Although many RFID-based schemes that quickly identify missing tag-attached items are proposed, most of the schemes overlooks the possibility of the internal crime. If a person controls an untrusted reader, he/she can freely forge responses from tags and steal items without being detected. In this paper, we propose a secure and fast missing tags identification against both the internal and external attackers. Our scheme first identifies tags stolen by an external attacker with a channel estimation based scheme. Then, our scheme lets tags send cryptographically generated responses, which are socalled MAC (Message Authentication Code), and verifies them to identify stolen tags by an internal attacker. In order to shorten the time to collect responses, our scheme lets multiple tags transmit responses simultaneously and decodes them by leveraging the estimated channels. By the security analysis and the computer simulation, we show the effectiveness of our scheme.\",\"PeriodicalId\":6464,\"journal\":{\"name\":\"2015 IEEE International Conference on Communication Workshop (ICCW)\",\"volume\":\"53 1\",\"pages\":\"2659-2664\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Communication Workshop (ICCW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCW.2015.7247580\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Communication Workshop (ICCW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2015.7247580","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure and fast missing RFID tags identification with lightweight MAC and rateless coding
The realtime identification of missing items, e.g., valuables or confidential documents in shops and warehouses, is one of the most important system. Although many RFID-based schemes that quickly identify missing tag-attached items are proposed, most of the schemes overlooks the possibility of the internal crime. If a person controls an untrusted reader, he/she can freely forge responses from tags and steal items without being detected. In this paper, we propose a secure and fast missing tags identification against both the internal and external attackers. Our scheme first identifies tags stolen by an external attacker with a channel estimation based scheme. Then, our scheme lets tags send cryptographically generated responses, which are socalled MAC (Message Authentication Code), and verifies them to identify stolen tags by an internal attacker. In order to shorten the time to collect responses, our scheme lets multiple tags transmit responses simultaneously and decodes them by leveraging the estimated channels. By the security analysis and the computer simulation, we show the effectiveness of our scheme.