Privacy-Preserving RFID-Based Search System
Abstract
:1. Introduction
2. Related Work
3. RFID-Based Search Protocol
3.1. Assumptions
3.1.1. Central Database Server (CDS)
3.1.2. Mobile Reader
3.1.3. RFID Tag
3.2. System Threats
- -
- Eavesdropping Attack: Adversaries can eavesdrop on all communications between mobile readers and tags. Even though the signal strength of tags is weak to eavesdrop, we assume that adversaries can eavesdrop on the communications emitted from tags as well as from readers, and that adequate security must therefore be provided.
- -
- Replay Attack: Adversaries can retransmit the eavesdropped/intercepted messages, after adversaries eavesdrop/intercept valid messages.
- -
- Spoofing Attack: After adversaries get response messages from a targeted tag by sending a malicious query to the tag, adversaries can masquerade as the targeted tag by sending these response messages to the reader’s request.
- -
- Physical Attack: Adversaries can get all stored information when adversaries physically compromise tags or mobile readers.
- -
- DoS Attack: Adversaries can exhaust resources of the central database server by sending a large number of request messages to the server.
3.3. Security and Privacy Requirements
3.3.1. Security Requirements
- -
- Confidentiality: Adversaries should not be able to extract any meaningful information even if communications between a reader and a tag are in fact eavesdropped.
- -
- Authentication: A reader must be convinced that a tag that communicates with him is legitimate. If the security system does not provide an appropriate level of authentication, an adversary will be able to impersonate a legitimate tag through a replay attack or spoofing attack.
- -
- Availability: Users must be able to search specific tags without an on-line connection to a central database in situations where users go to remote locations where the mobile reader cannot connect with the central database, or when the central database is seriously overloaded because of DoS attacks.
- -
- Anti-Cloning: Adversaries must not be able to create fake tags using response messages from the spoofing attacks. To clone a tag, an adversary first sends a request message to a tag and then gets a response message. Thereafter, the adversary stores the response message to a fake tag. After physically replicating the tag, the adversary attempts to establish authentication using the fake tag.
- -
- Leakage Resilience: Compromise of mobile readers through physical attacks should not compromise secret tag information. If the system does not satisfy the property of leakage resilience, adversaries can clone massive tags using data from tags stored in mobile readers.
3.3.2. Privacy Requirements
- -
- Tag-Indistinguishability: This notion ensures that an adversary will not be able to obtain useful information for monitoring and tracking a specific tag from the tag output [19]. If the adversary can distinguish the output of a specific tag from those of other tags, then she can easily trace the tag and obtain the location information about the person with that tag.
- -
- Reader-Indistinguishability: This notion ensures that an adversary will not be able to obtain location information for a reader from the reader output. Reader-Indistinguishability can be similarly defined as Tag-Indistinguishability.
- -
- Protection of Reader User’s Search Result: When searching a tag, if only one tag responds to a reader user’s request, adversaries can recognize whether the reader has found the specific tag or not. This reveals information about the reader user’s search result to the adversary. It should be impossible for an adversary to obtain a reader user’s search results in order to adequately address privacy concerns.
- -
- Protection of Reader User’s Previous Searches: Even if an adversary compromises a tag or a reader, the adversary should not be able to learn the previous searches of a reader user, such as which particular tag was searched. Otherwise, this will breach the privacy of the reader user.
4. Our Privacy-Preserving RFID-Based Search Protocol
- -
- : A deterministic polynomial-time encryption algorithm that takes as input a symmetric key and a message outputs a ciphertext .
- -
- : A deterministic polynomial-time decryption algorithm that takes as input a private key and a ciphertext outputs a plaintext .
4.1. Construction
- When a reader wants to search a tag, the reader compute by encrypting a message using the information of the tag and select a random number . Then the reader broadcasts and .
- Each tag that receives the messages from a reader decrypts the message using its own information. Then each tag compute by encrypting using the information with its own secret key and the value decrypted from the message . Each tag sends the messages and a random number to the reader.
- The reader checks messages from each tag, and then the reader knows whether the tag that it wants to find exists within its communication range or not. If the reader found the specific tag, then the reader sends messages and to CDS to update the secret information of the tag.
- CDS checks messages from the reader and then CDS computes and using the secret key of the tag. CDS updates the messages and and sends the messages to the reader.
- -
- For each RFID tag , CDS generates a tag identifier and a secret encryption key , and then stores the pair with the additional tag information into its own central database. Each tag stores the pair .
- -
- For a mobile reader , CDS generates an access list as follows: If a mobile reader is assumed to access to the tags , CDS initially computes each ciphertext for by encrypting with a secret key under the given encryption algorithm , where = . Then CDS adds the pairs in the access list . (See Table 3.) CDS transmits the access list to the mobile reader over a secure channel. Some values in the access list can be updated.
- : =When a reader wants to search a tag , the reader first chooses a -bit random number and computes using the stored value in , then broadcasts . Note that = . is the ℓ-th updated value of . This is described in the following Access List Update Phase.
- :After broadcasting the message, computes with the stored value in its access list. This value will be used to decrypt messages from nearby tags.
- :Each tag that receives a message decrypts the message using its own identifier and the decryption algorithm.
- :Each tag computes .
- :Each tag computes with its own secret key , an identifier , and the received random value .
- : =Each tag chooses a -bit random number and computes , then sends to . Note that all tags nearby respond to the request of , but only tag which wants to find will be able to send the correct response.
- :computes using the previously computed value in Step 2.
- :computes .
- : Check iffinally checks whether or not. If then knows that the tag which wants to find exists within its communication range.
- 10.
- CDS :After searching a tag using the Step 1 to 9, sends to CDS.
- 11.
- CDS: VerifyCDS verifies with the stored information for .
- 12.
- CDS:If the received value is valid, CDS computes using the keyed hash function H.
- 13.
- CDS : =CDS computes , and sends to .
- 14.
- : Store ,Stores the received values, and , in its access list.
4.2. Security & Privacy Analysis
4.2.1. Security Analysis
- -
- Confidentiality: Since the value from a reader is encrypted with an identifier of a tag that the reader wants to find (Step 1 in the tag search phase), the protocol satisfies the confidentiality requirement. When an adversary does not know which tag the reader wants to find, she cannot decrypt the message. The value from a tag is also encrypted (Step 6 in the tag search phase), so that only a legitimate reader can decrypt the message. Therefore, the adversary cannot extract any meaningful information from the eavesdropped messages between a reader and a tag.
- -
- Authentication: A reader ensures that a tag who communicates with him is legitimate using the shared secret value in the proposed protocol. The protocol is secure against replay attacks since the protocol uses the challenge-response method with fresh random numbers in every session (Step 1 and 6 in the tag search phase). After an adversary eavesdrops/intercepts the communication message from the tag, the adversary can retransmit the eavesdropped/intercepted message to the reader’s request. However, when a random number in the request of the reader is different from in the eavesdropped/intercepted message, the adversary cannot pass the authentication. The protocol is also secure against spoofing attacks. Even though an adversary intercepts a valid communication message from a reader and later replays the intercepted message, or even though the adversary creates an invalid message and then broadcasts this message, she cannot use this response message from the tag to pass the authentication process, for the same reason as with the replay attacks.
- -
- Availability: Each reader stores the access list of tags which it has access to (See Table 4). Using this access list, readers can search tags without an on-line connection to a central database. However, readers cannot update their access lists during the disconnection.
- -
- Anti-Cloning: Even if an adversary creates a fake tag using a response message from a spoofing attack, a fake tag cannot pass the authentication process (Step 9 in the tag search phase), since a random value in the response message is different from in the reader request.
- -
- Leakage Resilience: A reader stores an access list which has encrypted values (See Table 4), , and an adversary cannot extract secret tag keys from this access list because of the security of AES-128. Therefore, using the access list of a compromised reader , the adversary cannot make a valid response to the request of a reader , because the adversary cannot make from .
4.2.2. Privacy Analysis
- -
- Tag-Indistinguishability: Whenever a reader requests a reply, a tag responds with an encrypted message using a secret value computed by a tag’s secret key and a random number , which is chosen independently every session (Step 6 in the tag search phase). It is impossible for an adversary to distinguish the outputs of tags if the symmetric encryption algorithm that is used is indistinguishable.
- -
- Reader-Indistinguishability: Because a request message generated by a reader contains a random number which is chosen independently every session (Step 1 in the tag search phase), the proposed protocol satisfies Reader-Indistinguishability.
- -
- Protection of Reader’s Search Result: Since all tags nearby a reader respond to the request of the reader and responses sent by tags appear random from the viewpoint of an adversary because the message is encrypted under a secure symmetric encryption algorithm (Step 1 and 6 in the tag search phase), the proposed protocol does not reveal the search results of the reader.
- -
- Protection of Reader’s Previous Searches: Even when an adversary compromises a tag, the adversary cannot know whether the reader wanted to search the compromised tag or not using the stored information of the compromised tag. In the proposed protocol, the tag itself does not know whether the reader has found it or not (Step 6 in the tag search phase).
4.3. Efficiency Analysis
- -
- Tag Efficiency: In the proposed protocol, each tag only stores the secret key and the identifier and uses 3400 gates for the implementation of AES-128. Each tag performs one decryption and two encryptions for the response to the reader. Because these operations consume 9 µA (≤15 µA), the communication range of tags is not reduced, and the number of clock cycles is 3096. Table 5 shows efficiency comparisons of our protocol to previous protocols [4,5,6,7,12]. We use the result of Feldhofer et al. [17] to analyze those protocols (See Table 2). In protocols [5,6,12], each tag performs three hash operations of SHA-1, and in the protocol [7], each tag performs three decryptions and one encryption of AES-128. Each tag performs two encryptions and one decryption of AES-128 in the protocol [4]. Both the protocol [4] and our protocol have the same tag efficiency, but our protocol protects reader’s previous searches as described in Table 4. This is achieved by updating secret information in the access list whenever the reader finds the tag, and it does not affect the Tag Efficiency since tags do not need to update any information.
- -
- Reader Efficiency: In order to authenticate a tag using RFID authentication protocol, the reader performs an exhaustive search of up to as many as the total number of stored secret keys. However, in the proposed protocol, the reader performs m operations when the number of tags nearby the reader is m.
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Karygiannis, T.; Eydt, B.; Barber, G.; Bunn, L.; Phillips, T. Guidelines for Securing Radio Frequency Identification (RFID) Systems: Special Publication 800-98; Department of Commerce, U.S. National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2007.
- Węglarski, M.; Jankowski-Mihułowicz, P. Factors Affecting the Synthesis of Autonomous Sensors with RFID Interface. Sensors 2019, 19, 4392. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Working Group 6—Mobile Item Identification and Management (MIIM): ISO/IEC 29143, 29167, 29172–29179. Available online: http://www.hightechaid.com/standards/SC31_Standards/WG6_Mobile_Item_Identification.htm (accessed on 31 December 2020).
- Chun, J.Y.; Hwang, J.Y.; Lee, D.H. RFID Tag Search Protocol Preserving Privacy of Mobile Reader Holders. IEICE Electron. Express 2011, 8, 50–56. [Google Scholar] [CrossRef] [Green Version]
- Mtita, C.; Laurent, M.; Delort, J. Efficient Serverless Radio-frequency Identification Mutual Authentication and Secure Tag Search Protocols with Untrusted Readers. IET Inf. Secur. 2016, 10, 262–271. [Google Scholar] [CrossRef]
- Tan, C.; Sheng, B.; Li, Q. Secure and Serverless RFID Authentication and Search Protocols. IEEE Trans. Wirel. Commun. 2008, 7, 1400–1407. [Google Scholar] [CrossRef] [Green Version]
- Won, T.Y.; Chun, J.Y.; Lee, D.H. Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database. IEEE/IFIP Int. Conf. Embed. Ubiquitous Comput. 2008, 2, 153–158. [Google Scholar]
- Juels, A.; Weis, S.A. Authenticating Pervasive Devices with Human Protocols. In Proceedings of the Advances in Cryptology—Crypto, LNCS 3621, Santa Barbara, CA, USA, 14–18 August 2005; pp. 293–308. [Google Scholar]
- Paise, R.; Vaudenay, S. Mutual authentication in RFID: Security and privacy. In Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS), Tokyo, Japan, 18–20 March 2008; pp. 292–299. [Google Scholar]
- Vaudenay, S. On Privacy Models for RFID. In Proceedings of the Advances in Cryptology—ASIACRYPT, LNCS 4833, Sarawak, Malaysia, 2–6 December 2007; pp. 68–87. [Google Scholar]
- Burmester, M.; Medeiros, B.; Motta, R. Provably Secure Grouping-Proofs for RFID Tags. In Proceedings of the Eighth Smart Card Research and Advanced Application IFIP Conference (CARDIS), LNCS 5189, London, UK, 8–11 September 2008; pp. 176–190. [Google Scholar]
- Tan, C.; Sheng, B.; Li, Q. Serverless Search and Authentication Protocols for RFID. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom), White Plains, NY, USA, 19–23 March 2007; pp. 3–12. [Google Scholar]
- Ahamed, S.I.; Rahman, F.; Hoque, E.; Kawsar, F.; Nakajima, T. S3PR: Secure Serverless Search Protocols for RFID. In Proceedings of the 2008 International Conference on Information Security and Assurance (ISA), Busan, Korea, 24–26 April 2008; pp. 187–192. [Google Scholar]
- Ahamed, S.I.; Rahman, F.; Hoque, E.; Kawsar, F.; Nakajima, T. Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol. Int. J. Secur. Its Appl. 2008, 2, 57–66. Available online: http://modul.repo.mercubuana-yogya.ac.id/modul/files/pkk/OpenJournalOfEconomy/7_561.pdf (accessed on 31 December 2020).
- Hoque, M.E.; Rahman, F.; Ahamed, S.I.; Park, J.H. Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments. Wirel. Pers. Commun. 2009, 1–15. [Google Scholar] [CrossRef]
- Radio Frequency Identification (RFID): A Focus on Information Security and Privacy. In OECD Working Party on Information Security and Privacy, DSTI/ICCP/REG(2007)9/FINAL; OECD Publishing: Paris, France, 2008; pp. 1–70.
- Feldhofer, M.; Wolkerstorfer, J. Strong crypto for RFID tags-A comparison of low-power hardware implementations. In Proceedings of the 2007 IEEE International Symposium on Circuits and Systems (ISCAS), New Orleans, LA, USA, 27–30 May 2007; pp. 1839–1842. [Google Scholar]
- Chun, J.Y.; Hwang, J.Y.; Lee, D.H. Privacy-enhanced RFID Tag Search System. In Advanced Radio Frequency Identification Design and Applications; IntechOpen: London, UK, 2011; Chapter 9; pp. 173–188. [Google Scholar]
- Ohkubo, M.; Suzuki, K.; Kinoshita, S. Cryptographic Approach to “Privacy-Friendly” Tags. In Proceedings of the RFID Privacy Workshop, Cambridge, MA, USA, 15 November 2003. [Google Scholar]
- Bellare, M.; Desai, A.; Jokipii, E.; Rogaway, P. A Concrete Security Treatment of Symmetric Encryption. In Proceedings of the 38th Annual IEEE Computer Society Conference on Foundations of Computer Science (FOCS), Miami Beach, FL, USA, 20–22 October 1997; pp. 394–403. [Google Scholar]
- Katz, J.; Lindell, Y. Introduction to Modern Cryptography; Chapman and Hall/CRC: Boca Raton, FL, USA, 2007. [Google Scholar]
- Sotto, J.; Bassaham, L. Randomness Testing of the Advanced Encryption Standard Finalist Candidates. In Technical Report, National Institute of Standards and Technologies; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2000. [Google Scholar]
- Bellare, M.; Canetti, R.; Krawczyk, H. Keying Hash Functions for Message Authentication. In Proceedings of the Advances in Cryptology—Crypto, LNCS 1109, Santa Barbara, CA, USA, 18–22 August 1996; pp. 1–15. [Google Scholar]
Notation | Definition |
---|---|
CDS | Central Database Server |
AES | Advanced Encryption Standard |
DoS | Denial of Service |
encryption algorithm | |
decryption algorithm | |
bit length of a key | |
bit length of a plaintext, a ciphertext, an identifier, etc. | |
symmetric key | |
message/plaintext | |
ciphertext | |
symmetric encryption algorithm | |
mobile reader | |
identifier of a mobile reader | |
RFID tag | |
identifier of an RFID tag | |
keyed hash function | |
secret encryption key | |
access list | |
random number |
Algorithm | Security | Imean | Chip Area | Clock |
---|---|---|---|---|
[Bits] | [µA@100 kHz] | [GE] | [Cycles] | |
SHA-256 | 128 | 10,868 | 1128 | |
SHA-1 | 80 | 8120 | 1274 | |
MD5 | 80 | 8001 | 712 | |
AES-128 | 128 | 3400 | 1032 | |
ECC-192 | 96 | 23,600 | 502,000 |
ID | Secure Values |
---|---|
… | … |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chun, J.Y.; Noh, G. Privacy-Preserving RFID-Based Search System. Electronics 2021, 10, 599. https://doi.org/10.3390/electronics10050599
Chun JY, Noh G. Privacy-Preserving RFID-Based Search System. Electronics. 2021; 10(5):599. https://doi.org/10.3390/electronics10050599
Chicago/Turabian StyleChun, Ji Young, and Geontae Noh. 2021. "Privacy-Preserving RFID-Based Search System" Electronics 10, no. 5: 599. https://doi.org/10.3390/electronics10050599
APA StyleChun, J. Y., & Noh, G. (2021). Privacy-Preserving RFID-Based Search System. Electronics, 10(5), 599. https://doi.org/10.3390/electronics10050599