Trusted anonymizer-based RFID system with integrity verification

  title={Trusted anonymizer-based RFID system with integrity verification},
  author={Mohd Faizal Mubarak and Jamalul-lail Ab Manan and Saadiah Yahya},
  journal={2011 7th International Conference on Information Assurance and Security (IAS)},
  • M. Mubarak, J. Manan, S. Yahya
  • Published 1 December 2011
  • Computer Science
  • 2011 7th International Conference on Information Assurance and Security (IAS)
RFID technology is considered as an advanced identification system because it can communicate through wireless communication. However, the unprotected wireless communication channel opens up many possibilities of these tags being tracked by illegal reader which violates data privacy. Past works revealed that RFID tags would be the easy target of attacks related to system security and data privacy. The more advanced RFID technology can embed its applications in hand-held devices such as NFC type… 

Figures from this paper

Detecting Cloning Attack in Low-Cost Passive RFID Tags An Analytic Comparison between KILL Passwords and Synchronized Secrets Obinna

This paper analytically compared two methods to detect tag cloning and found the KILL password and synchronized secret to be the most effective and efficient methods.

Analysis on functionalities and security features of Internet of Things related protocols

This paper aims at investigating such security features, which are often combined with native functionalities, in the most known IoT-related protocols: MQTT, CoAP, LoRaWAN, AMQP, RFID, ZigBee, and Sigfox, in order to point out open issues and best practices in the design of efficient and robust IoT network infrastructure.



Mutual Attestation Using TPM for Trusted RFID Protocol

  • M. MubarakJ. MananS. Yahya
  • Computer Science
    2010 Second International Conference on Network Applications, Protocols and Services
  • 2010
A mutual attestation for trust RFID protocol is proposed by using trusted platform module (TPM) and AES encryption for encrypting data transfers within the trusted RFID system.

Location Privacy in RFID Applications

This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues, and presents new promising directions for privacy-preserving RFID systems, where as a case study electronic tickets for public transportation is presented.

Strong Authentication for RFID Systems Using the AES Algorithm

A novel approach of an AES hardware implementation which encrypts a 128-bit block of data within 1000 clock cycles and has a power consumption below 9 μA on a 0.35 μm CMOS process is introduced.

Anonymizer-Enabled Security and Privacy for RFID

This paper presents a privacy-preserving RFID protocol that uses anonymizers and achieves narrow-strong privacy without requiring tags to perform expensive public-key operations, thus providing a satisfying notion of privacy for cost-efficient tags.

On RFID Privacy with Mutual Authentication and Tag Corruption

The model proposed by Paise and Vaudenay is revisited and it is shown that the strongest privacy notion (narrow-strong privacy) cannot be achieved simultaneously with reader authentication even if the adversary is not capable of corrupting a tag during the protocol execution.

Anonymous RFID Authentication Using Trusted Computing Technologies

This paper analyzes how the Direct Anonymous Attestation protocol can be used for anonymous authentication in NFC scenarios and proposes an approach that allows a practical use of this technology in real-world scenarios.

Security and Privacy Issues in E-passports

  • A. JuelsD. MolnarD. Wagner
  • Computer Science
    First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
Privacy and security issues that apply to e-passports are described and analyzed, and these issues are analyzed in the context of the International Civil Aviation Organization (ICAO) standard for e- Passports.

A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model

This research contributes to those solutions in a novel model for a novel classification of the RFID systems in an attempt to take security and privacy risks into a better understanding within a specific domain for a more optimized addressing of the problems encountered.

RFID malware: Design principles and examples

ECC Is Ready for RFID - A Proof in Silicon

ECCon is the first demonstration that the proof of origin via electronic signatures can be realized on RFID tags in 180 nm CMOS and below and the first ECC chip that can be powered passively.