CARDIS 2006: Smart Card Research and Advanced Applications pp 300-312 | Cite as
MARP: Mobile Agent for RFID Privacy Protection
Abstract
Recently many researchers in various fields has noticed RFID system. RFID system has many advantages more than other automatic identification system. However, it has some consumer privacy problems, such as location tracking and disclosure of personal information. Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme using personal mobile device for the privacy protection. Our MARP, mobile agent for RFID privacy protection, has strong cryptographic modules with a powerful CPU and battery system and guarantees more high-level security than other protection schemes. MARP acquires a tag’s secrete information partially and becomes the proxy agent of the tag which is in its sleep mode. All readers can communicate with MARP instead of the tag and can attempt authentication with MARP. Since the tag should have only one hash module in the environment of MARP, we can use the existing tag hardware with slight modification for protection consumer’s privacy in RFID system.
Keywords
Mobile Agent Privacy Protection Mutual Authentication Sleep Mode Secret DataReferences
- 1.Finkenzeller, K.: RFID handbook. John Wiley & Sons, Chichester (1999)Google Scholar
- 2.Brock, D.: The Electronic Product Code - A Naming Scheme for physical Objects, Auto-ID White Paper (January 2001), http://www.autoidlabs.com/whitepapers/MIT-AUTOIDWH-002.pdf
- 3.Knospe, H., Pobl, H.: RFID Security. Infomation Security Technical Report 9(4), 39–50 (2004)CrossRefGoogle Scholar
- 4.Sarma, S., Weis, S., Engels, D.: Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes 6(1), 2–9 (2003)Google Scholar
- 5.Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 6.Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–135. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- 7.Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Lowcost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454–469. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 8.Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
- 9.Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Computer and Communications Security - ACM CCS 2003, pp. 27–30 (October 2003)Google Scholar
- 10.Juels, A., Brainard, J.: Soft Blocking: Flexible Blocker Tags on the Cheap. In: Workshop on Privacy in the Electronic Society - WPES 2004, pp. 1–7 (October 2004)Google Scholar
- 11.Rieback, M., Crispo, B., Tanenbaum, A.: RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 184–194. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 12.Tanenbaum, A., Gaydadjiev, G., Crispo, B., Rieback, M., Stafylarakis, D., Zhang, C.: The RFID Guardian Project, http://www.cs.vu.nl/~melanie/rfidguardian/people.html
- 13.Avoine, G.: Adversarial Model for Radio Frequency Identification, Cryptology ePrint Archive, Report 2005/049 (2005), http://eprint.iacr.org
- 14.Saito, J., Ryou, J., Sakurai, K.: Engancing Privacy of Universal Re-Encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 15.Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal Re-Encryption for Mixnet. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 16.Konomi, S.: Personal Privacy Assistants for RFID Users. In: International Workshop Series on RFID (November 2004)Google Scholar
- 17.Juels, A., Syverson, P., Bailey, D.: High-Power Proxies for Enhancing RFID Privacy and Utility. In: Center for High Assurance Computer Systems – CHACS (August. 2005)Google Scholar
- 18.Gao, X., Xiang, Z., Wang, G., Shen, J., Huang, J., Song, S.: An Approach to Security and Privacy of RFID System for Supply Chain. In: Conference on E-Commerce Technology for Dynamic E-Business – CEC-East 2004, pp. 164–168 (September 2005)Google Scholar