Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-143-4-63
Wen-Tsai Ko, E. Lu, Shin-Yan Chiou, H. Chang
{"title":"A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application","authors":"Wen-Tsai Ko, E. Lu, Shin-Yan Chiou, H. Chang","doi":"10.3233/978-1-61499-143-4-63","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-63","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-462-6-3
Yang Li, Shugo Mikami, Dai Watanabe, K. Ohta, K. Sakiyama
{"title":"Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication","authors":"Yang Li, Shugo Mikami, Dai Watanabe, K. Ohta, K. Sakiyama","doi":"10.3233/978-1-61499-462-6-3","DOIUrl":"https://doi.org/10.3233/978-1-61499-462-6-3","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-462-6-51
N. Lo, I-Fan Wang, Yo-Hsuan Chuang
{"title":"RFID Multi-Ownership Transfer Protocol in VMI Environments","authors":"N. Lo, I-Fan Wang, Yo-Hsuan Chuang","doi":"10.3233/978-1-61499-462-6-51","DOIUrl":"https://doi.org/10.3233/978-1-61499-462-6-51","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117162634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-143-4-85
N. Lo, Kuo-Hui Yeh, Hsuan-Yu Chen
{"title":"Cryptanalyses of Two Ultralightweight RFID Authentication Protocols","authors":"N. Lo, Kuo-Hui Yeh, Hsuan-Yu Chen","doi":"10.3233/978-1-61499-143-4-85","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-85","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-328-5-3
Nan Li, Y. Mu, W. Susilo, F. Guo, V. Varadharajan
Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zeroknowledge based tag authentication protocols and prove that they offer wide-strong privacy. Disciplines Engineering | Science and Technology Studies Publication Details Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2013). On RFID authentication protocols with widestrong privacy. Cryptology and Information Security Series, 11 3-16. This journal article is available at Research Online: http://ro.uow.edu.au/eispapers/1817 On RFID Authentication Protocols with Wide-Strong Privacy 1 Nan Li , Yi Mu , Willy Susilo , Fuchun Guo a and Vijay Varadharajan b a Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia e-mail: {nl864,ymu,wsusilo,fuchun}@uow.edu.au b Information and Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney,Australia e-mail: vijay.varadharajan@mq.edu.au Abstract. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.
{"title":"On RFID Authentication Protocols with Wide-Strong Privacy","authors":"Nan Li, Y. Mu, W. Susilo, F. Guo, V. Varadharajan","doi":"10.3233/978-1-61499-328-5-3","DOIUrl":"https://doi.org/10.3233/978-1-61499-328-5-3","url":null,"abstract":"Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zeroknowledge based tag authentication protocols and prove that they offer wide-strong privacy. Disciplines Engineering | Science and Technology Studies Publication Details Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2013). On RFID authentication protocols with widestrong privacy. Cryptology and Information Security Series, 11 3-16. This journal article is available at Research Online: http://ro.uow.edu.au/eispapers/1817 On RFID Authentication Protocols with Wide-Strong Privacy 1 Nan Li , Yi Mu , Willy Susilo , Fuchun Guo a and Vijay Varadharajan b a Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia e-mail: {nl864,ymu,wsusilo,fuchun}@uow.edu.au b Information and Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney,Australia e-mail: vijay.varadharajan@mq.edu.au Abstract. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131302775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-328-5-107
Raja Naeem Akram, K. Markantonakis, K. Mayes
Remote attestation mechanisms are well studied in the highend computing environments; however, the same is not true for embedded devices especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multiapplication platform, verifying the current state of the smart card is signi cant to the overall security of such proposals. The initiatives proposed by GlobalPlatform Consumer Centric Model (GP-CCM) and User Centric Smart Card Ownership Model (UCOM) enables a user to download any application as she desire depending upon the authorisation of the application provider. Before an application provider issues an application to a smart card, verifying the current state of the smart card is crucial to the security of the respective application. In this paper, we analyse the rationale behind the remote attestation mechanism for smart cards, and the fundamental features that such a mechanism should possess. We also study the applicability of Physical Unclonable Functions (PUFs) for the remote attestation mechanism and propose two algorithms to achieve the stated features of remote attestation. The proposed algorithms are implemented in a test environment to evaluate their performance.
{"title":"Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.3233/978-1-61499-328-5-107","DOIUrl":"https://doi.org/10.3233/978-1-61499-328-5-107","url":null,"abstract":"Remote attestation mechanisms are well studied in the highend computing environments; however, the same is not true for embedded devices especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multiapplication platform, verifying the current state of the smart card is signi cant to the overall security of such proposals. The initiatives proposed by GlobalPlatform Consumer Centric Model (GP-CCM) and User Centric Smart Card Ownership Model (UCOM) enables a user to download any application as she desire depending upon the authorisation of the application provider. Before an application provider issues an application to a smart card, verifying the current state of the smart card is crucial to the security of the respective application. In this paper, we analyse the rationale behind the remote attestation mechanism for smart cards, and the fundamental features that such a mechanism should possess. We also study the applicability of Physical Unclonable Functions (PUFs) for the remote attestation mechanism and propose two algorithms to achieve the stated features of remote attestation. The proposed algorithms are implemented in a test environment to evaluate their performance.","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121871508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-328-5-57
F. Huo, Chouchang Yang, Guang Gong, R. Poovendran
RFID technology has gained tremendous popularity in the recent years. The tiny, inexpensive RFID tags can be easily attached to objects for seamless identification. However, one glaring weakness of RFID tags, especially passive RFID tags is its lack of capability for implementing strong crypto primitives for security purposes. When no or a weak crypto primitive is implemented, the adversary could easily eavesdrop to the communication session between the reader and the tag, he can potentially gain all the secrets about the tag. In doing so, the secrecy of the messages and the privacy of the tag is violated. In this paper, we introduce a new framework that would protect the messages transmitted from the tag to the reader. This framework makes use of the physical properties of RFID systems by sending a random time-varying waveform from the tag to the reader for power harvesting rather than a fixed amplitude waveform. We show theoretically this framework is secure against one eavesdropper by showing the eavesdropper’s decoding error probability is very close to 50%. Furthermore, we have implemented our framework, the experimental results also confirm with our theoretical results. Finally, we will discuss two more stronger forms of attack.
{"title":"A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power","authors":"F. Huo, Chouchang Yang, Guang Gong, R. Poovendran","doi":"10.3233/978-1-61499-328-5-57","DOIUrl":"https://doi.org/10.3233/978-1-61499-328-5-57","url":null,"abstract":"RFID technology has gained tremendous popularity in the recent years. The tiny, inexpensive RFID tags can be easily attached to objects for seamless identification. However, one glaring weakness of RFID tags, especially passive RFID tags is its lack of capability for implementing strong crypto primitives for security purposes. When no or a weak crypto primitive is implemented, the adversary could easily eavesdrop to the communication session between the reader and the tag, he can potentially gain all the secrets about the tag. In doing so, the secrecy of the messages and the privacy of the tag is violated. In this paper, we introduce a new framework that would protect the messages transmitted from the tag to the reader. This framework makes use of the physical properties of RFID systems by sending a random time-varying waveform from the tag to the reader for power harvesting rather than a fixed amplitude waveform. We show theoretically this framework is secure against one eavesdropper by showing the eavesdropper’s decoding error probability is very close to 50%. Furthermore, we have implemented our framework, the experimental results also confirm with our theoretical results. Finally, we will discuss two more stronger forms of attack.","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129538428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-143-4-45
Jie Shi, Yingjiu Li, R. Deng, K. Chiew
{"title":"Design and Implementation of a Secure Prototype for EPCglobal Network Services","authors":"Jie Shi, Yingjiu Li, R. Deng, K. Chiew","doi":"10.3233/978-1-61499-143-4-45","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-45","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Design of Secure APIs for IoT Applications - Using Taiwan Uniform e-Invoices as Examples","authors":"Shi-Cho Cha, Jyun-Fu Chen, Shih-Chieh Huang, Chih-Teng Tseng, Wei-Kai Chen","doi":"10.3233/978-1-61499-143-4-9","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-9","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.3233/978-1-61499-143-4-73
K. Mandal, Xinxin Fan, G. Gong
{"title":"Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags","authors":"K. Mandal, Xinxin Fan, G. Gong","doi":"10.3233/978-1-61499-143-4-73","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-73","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}