Reassignment Scheme of an RFID Tag s Key for Owner Transfer

Similar documents
Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems

Traceability in RFID Systems

Low-cost RFID identification variation

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Seminar: Communication Infrastructure, RFID Security

RFID Overview. Outline. Definition. Barcode Replacement. Reading Tags

and they can be managed throughout their life-cycle. RFID tags are silicon chips with their IDs, radio frequency functions and some

Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader

RFID FAQs, not Fiction

Radio Frequency Identification A Review of Low Cost Tag Security Proposals

High-Power Proxies for Enhancing RFID Privacy and Utility

Privacy Challenges in RFID

Privacy Preservation and Mutual Authentication in RFID Systems

IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD

Manufacturing Insights: RFID: Tool Tracking Solutions

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System

A Secured Mutual Authentication Protocol For RFID System

Lightweight Cryptography for RFID Systems

High-Power Proxies for Enhancing RFID Privacy and Utility

SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network

EPC Standards: EPC Tag Classes: EPC Class Type Features Tag Type

Privacy in RFID. Strong Privacy needs Public-Key Cryptography. Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE.

RFID Product and Brand Protection Finding the privacy and security settlement for the mass market

Plan, outline / Wireless Networks and Applications Lecture 23: RFID and NFC. How Does It Work? What is RFID? Page 1

RADIO FREQUENCY IDENTIFICATION (RFID) Anush Kumar,Chandan Kumar Department of ECE Dhronacharya Engineering College,Gurgaon,India

Wireless# Guide to Wireless Communications. Objectives

Smart Brands and Product Protection 2005

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL

RFID Based Event/Activity Management System

ZMC, LLC Distribution. & Technical Services. Library RFID Management System

Today s Lecture - RFID. Part I: Technology and applications. Part II: Security and privacy aspects.

Avonwood Developments Ltd. Tel: +44 (0) Fax: +44 (0) Web:

Barcodes or RFID Tags. Key Factors to Consider in Choosing the Data Collection Technology for Your Operation

Needs Assessment Report for the A&P Supermarkets

A Lightweight and Practical RFID Grouping Authentication Protocol in Multiple-Tag Arrangements

Security challenges for RFID key applications

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

Use of RFID Technology for Identification, Traceability Monitoring and the Checking of Product Authenticity

Information Security in Electronic Toll Fare System

RFID EPC-Gen2 for Postal Applications: A Security and Privacy Survey

Research and Development. Needs for RFID

Improvements to NFC Mobile Transaction and Authentication Protocol

Client Alert. Radio Frequency Identification RFID Technology Implications for Privacy in Europe. Privacy & Data Protection.

RFID (Radio Frequency IDentification)

Basics of EPC. Training

Root Beer Game in Progress

Traceability and Identification Solutions for Secure and Comfortable Society

THE APPLICATION OF RADIO FREQUENCY IDENTIFICATION (RFID) IN SPEEDING UP THE FLOW OF MATERIALS IN AN INDUSTRIAL MANUFACTURING PROCESS

RFID Technologies. By Francisco J. Carabez

SMART TROLLEY FOR GUIDING CUSTOMERS IN SUPER MARKETS USING AOT

Real World Applications of RFID. Mr. Mike Rogers Bryan Senior High School Omaha, NE

RFID Based Electricity Billing and Cut-Off System for Energy Through GSM

Product Specific Security Features Based on RFID Technology

CSE 303 Concepts and Tools for Software Development. Magdalena Balazinska Winter Lecture 25 Impact of Computer Engineering Solutions: RFID

RFID & MOBILE FUSION FOR AUTHENTICATED ATM TRANSACTION

Application of RFID Technique in Supply Chain Management

KEYWORDS: RFID, RFID tags, RFID receiver, Lecturer, Students, Attendance. INTRODUCTION:

Lecture 10: Electronic Cash and Oblivious Transfer

RFID AS A TOOL FOR SAFETY, SECURITY, PRIVACY AND CONVENIENCE FOR INTELLIGENT TRANSPORT SYSTEMS

IBM Research Report. Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced

RFIDs at Work: Tracking Assets, Managing People, and Controlling Costs. Jack Cook, Ph.D., CFPIM, CSQE, CSCP

RFID and Privacy Impact Assessment (PIA)

* Future University - Hakodate Nippon Data Service Co., LTD Alpha Hydraulic Engineering Consultants Co., LTD

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises

Supply Chain Security and Loss Prevention Through Effective Counterfeit Prevention and Detection RFID Data Structure

RFID TECHNOLOGY FOR IDENTIFICATION, SECURITY AND DOCUMENT HANDLING IN LIBRARY

Identity Management. ID management for people and objects

Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective!

TIME-MEMORY TRADE-OFF IN RFID SYSTEMS

RAIN Radio Protocol. December 2015

Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement

Don t Make the Mistake of Using RFID Technology With an Application Built for Barcodes

Supplier Security Directives

What is RFID? RFID versus Bar Coding

Security of Smartcard Based Payment Protocol

AN AGENT-BASED APPROACH TO MICROPAYMENT SYSTEM

Walki pantenna. A precision-tailored RFID

SECURE AUTHENTICATION THROUGH A NEAR FIELD COMMUNICATION IN ASYMMETRIC CRYPTOGRAPHY

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas

Question Paper Code : J1133

Summary of Mobile Payments Industry Workgroup (MPIW) Meeting with Merchants and Mobile Payment Start-ups September 25, 2012

Laboratory Management Based on Internet of Things. Jianming Huang

A Secure Platform for Information Sharing in EPCglobal Network

M-Money. Legal and Regulatory Issues. Retail Payment Mechanisms. Professor Benjamin Geva. Osgoode Hall Law School of York University, Toronto, Canada

New Directions in RFID Security

White Paper. A B C s o f R F I D : U N D E R S T A N D I N G

MASTER S THESIS. An implementation of the Millicent micro-payment protocol and its application in a pay-per-view business model

RFID Refrigerator Project Proposal

Identify, Track, Count and Manage Items in Real-Time Using PortalTrack

Dimitar Popov Zeina Muallem

New Directions in RFID Security

ITEM REMOVED PDA023 DATE REMOVED 14:08:14 TIME REMOVED 9:30AM FAULT CODE NONE. Intelligent Lockers. Solutions for total asset management

SMART ATTENDANCE AND AUTO NOTIFICATION SYSTEM USING RFID

TECHNOLOGY FOR FOOD STORE EFFICIENCY

Latest Trends in Packaging for the next decade.

AUTOMATIC TOLL TAX COLLECTION SYSTEM BY USING RFID

The past two years have witnessed an explosion of interest

Whitepaper: Do Passive RFID Tags need Hazardous Area certification?

Evertson Croes ( ) Danny Hendrix ( ) Carlo Meijer ( ) Roland Verbruggen ( ) Akis Dimakogiannis ( ) December 5, 2013

ENABLING SECURED TRACEABILITY OF FISHERY PRODUCTS USING 2D CODE AND DIGITAL ENCRYPTION

Transcription:

Reassignment Scheme of an RFID Tag s Key for Owner Transfer Junichiro Saito 1, Kenji Imamoto 1, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, The Department of Computer Science and Communication Engineering, Kyushu University, 6-10-1 Hakozaki, Higashi-ku, Fukuoka, 812-8581, Japan saito@itslab.csce.kyushu-u.ac.jp imamoto@itslab.csce.kyushu-u.ac.jp 2 Department of Computer Science and Communication Engineering, Kyushu University, 6-10-1 Hakozaki, Higashi-ku, Fukuoka, 812-8581, Japan sakurai@csce.kyushu-u.ac.jp Abstract. A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The RFID tag is used for management of goods and used as a substitute for a bar code. However, RFID system may infringe on a consumer s privacy because it has a strong tracing ability. In this paper, we propose a key change scheme which can prevent previous owner from reading the RFID tag after changing its owner. By using our scheme, previous owner cannot read and trace ID information on the RFID tag. Moreover it is possible to combine other privacy protection scheme with our scheme because our scheme uses only symmetric key cryptography. 1 Introduction A Radio-Frequency-Identification (RFID) tag is a small and cheap device that consists of an IC chip and an antenna which communicate by radio frequency. A radio communication device called reader emits a query to an RFID tag and read ID of an RFID tag. When a reader emits a query, there are readers which also transmit power for the RFID tags, so an RFID tag does not have power supply in that case. Therefore an RFID tag expected to be used as a substitute of a bar code in the future. In order to use as a bar code, the cost of an RFID tag is $0.05/unit, and tags are small as 0.4mm * 0.4mm and thin enough to be embedded in paper. For this reason, the capacity of a RFID tag is limited and an RFID tag is difficult to process complicated procedure. Moreover, because of using a radio frequency, a communication between an RFID tag and a reader will be simply monitored. There are some kinds of an RFID tag and it is classified according to communication distance, the kind of memory, and the existence of a power supply. First, there are a close type (0 - several mm) and proximity type (several mm - dozens cm) and a remoteness type (dozens cm - several m) in communication distance. In T. Enokido et al. (Eds.): EUC Workshops 2005, LNCS 3823, pp. 1303 1312, 2005. c IFIP International Federation for Information Processing 2005

1304 J. Saito, K. Imamoto, and K. Sakurai memory type, there are read only type, and once write and read type, and write and read type. In the case of writeable memory, a radio communication device called reader/writer can write in ID information on an RFID tag. In the case of read only type, the ID is determined in the manufacture stage of a RFID tag. Moreover, there are an active type and a passive type in the power supply of a RFID tag. The active type contains the power supply in the RFID tag, and a passive type obtains electric power from a reader by method which was mentioned above. From cost or the ease of use, a passive type of power supply is used in many cases. This tag is used for next generation barcode in the field of distribution. By using an RFID tag, we can manage ID information in a database and optimize distribution and stock of products. An RFID tag has more information than printed barcode. Moreover, when an RFID tag is attached to various goods, consumers will use it after buying goods. For example, we can use an RFID tag for theft detection and goods management. More specificaly, a refrigerator which reads an RFID tag can observe best-before date of foodstuffs. However, we should concern about security problem on an RFID tag. Most important problem is privacy problem. The communication between a reader and a RFID tag is performed by radio. Thus, it is simply tapped by an attacker. Moreover, the location of the owner can be traced by tracing the information on the specific RFID tag even if the attacker cannot understand the contents of ID. This privacy about owner s location is called as location privacy. For this reason, if an RFID tag is used for distribution, leakage of information about distribution is important. Moreover, a retailer can trace a consumer after selling goods. Therefore, we need a scheme to prevent from reading ID information on an RFID tag after changing its owner. In this paper, we propose owner change schemes for an RFID tag by using three party model and two party model. In our schemes, ID information on an RFID tag is encrypted by using symmetric cryptosystem to prevent from leakage of ID information. Moreover, our schemes can prevent from reading ID information by previous owner by changing key of encryption. 2 Privacy Problems on an RFID Tag The communication between a reader and an RFID tag is performed by radio. Thus, it is simply tapped by an attacker. The reader can simply derive information from the RFID tag and it can be used to infringement of the privacy. There are two privacy problems on the RFID tag. First is the leakage of ID information. Since the RFID tag has unique ID, if the attacker obtains the ID, he can get information about objects that the tag was attached. For example, the size and the price of clothes, the contents of a wallet, the inventory information about the goods of a store etc. can be leaked. As a result, it infringes on the owner s privacy. We can protect this problem by using anonymity of ID information by using encryption scheme. Therefore, the attackercan notknow what encryptedid means. Second problem is the tracing ID information. An attacker can trace by tracing the information on the specific tag even if an attacker cannot understand the

Reassignment Scheme of an RFID Tag s Key for Owner Transfer 1305 ask ID query Database Secure communication Reader ID Radio communication RFID tag Fig. 1. RFID system meanings of ID of the RFID tag. Therefore, he can know the location of the tag and the owner of the tag. This privacy about owner s location is called as location privacy. Therefore, an attacker can trace the owner of RFID tags by reading them. Moreover, it is also considered that the owner suffers the further damage. When a RFID tag is embedded in banknotes, it is possible that the information on an RFID tag can be read after drawing money from a bank, and it can be pursued exactly, and will be involved in a crime [1, 2]. Even if the attacker can not know what kind of banknotes a person has, he can know the person has many tags which is attached to banknotes. So RFID tags can be a detector of rich people. Therefore, the effective privacy protection scheme in an RFID tag is needed. Against these problems, some previous results [3, 4, 5] proposed privacy protection schemes which can change ID information periodically to protect location privacy. Since ID information is not fixed by using these schemes, the attcker cannot trace specific tgas. 2.1 Privacy Problems Related with Owner Changing When an RFID tag is used everywhere, the owner of the RFID tag is changed in its lifecycle. For example, when an RFID tag is attached to products, its owner changes from a manufacturer to a distributor, and from a retailer to a consumer. In this case, there are some problems if previous owner can read ID information on the RFID tag after changing its owner. For example, the retailer can trace the consumer. There are some schemes to prevent a third party from reading ID information [3, 4, 5]. However, since the previous owner might have important information like a decryption key, he can trace the RFID tag by using these information. Thus, we cannot protect consumer s privacy by using these schemes. Therefore, we need to change these information when owner of tags is changed. 2.2 Traceability and Location Privacy We will show the diference between tracebility and location privacy. RFID tags realize traceability by tracing ID information on RFID tags. When RFID tags are

1306 J. Saito, K. Imamoto, and K. Sakurai used for goods management, reading ID information on RFID tags is recorded in a database and its source and transportation history are recorded. After goods are displayed at a shop, consumers can check a source of goods and know transportation history of the goods by accessing the database. In this case, this property that we can get backward information is called as traceability. On the other hand, it is a problem that a shop assistant can trace RFID tags attached to goods by reading its ID information after consumers buy them. If the shop assistants can trace RFID tags, she can trace consumers and know the location of them. So we want that no one can get forward information after the owner of RFID tags is changed. So its privacy problem is called as location privacy. Then, we propose schemes which can change a key on an RFID tag when its owner is changed. By using our schemes, previous owner cannot trace ID information on the RFID tag and we can protect privacy related with owner changing. 3 Owner Change Scheme on Three Party Model We propose an owner change scheme using symmetric key cryptosystem. In our proposed scheme, an RFID tag is required to encrypt its ID information by using symmetric key. Moreover, our scheme can be used with other privacy protection scheme like [3, 4, 5] because we propose only key change scheme. So the ID information can be a ciphertext of these privacy protection scheme. In our scheme, previous owner gives an encryption key to new owner and new owner replaces the key to a new key. As a result, previous owner cannot decrypt ID information on the RFID tag by using his own key after changing the encryption key. Moreover, when new owner changes the key, we uses trusted third party (TTP) to encrypt new key. Therefore, new owner submits the encrypted key to the RFID tag. So if an attacker eavesdrops the encrypted key, she cannot decrypt the key. Therefore, we can prevent the attacker from getting new key. Next, we define our model in our scheme and show our scheme. 3.1 Model We show our model below. There are four entities in our model. ID : ID is a static identifier, such that a serial number. Moreover, we can also use ciphertext of other privacy protection scheme as ID. T : An RFID tag. It shares a symmetric key K 1 with Owner 1 and a symmetric key K TTP with TTP. It generates a ciphertext C = SK K1 [ID] by using K 1. Owner 1 : Previous owner. He shares a symmetric key K 1 with the RFID tag. Owner 2 : New owner. He receives K 1 from previous owner and generates new symmetric key K 2.

Reassignment Scheme of an RFID Tag s Key for Owner Transfer 1307 Secure channel Secure channel Owner1 Owner2 TTP Insecure channel Tag Fig. 2. Model of communication channels TTP : Trusted third party. He shares K TTP with an RFID tag T. In practice, the role is played by a service provider of traceability or ID provider. These shared keys are securely shared in advance. Next, we show our models of communication channels. This model is shown in Figure 2. Owner 1 to Owner 2 : This channel is an existent secure channel. Owner 2 can authenticate Owner 1 and send a message without leakage. Owner 2 to TTP : This channel is the same as above channel. Owner 2 to T : This channel is radio frequency channel. An attacker can tap this channel. Therefore, the channel is not secure. 3.2 Protocol We show our proposed scheme below. 1. Owner 1 gives a key K 1 to Owner 2 by using a secure communication channel. 2. Owner 2 generates a new key K 2 and send K 1 and K 2 to TTP by using a secure communication channel. 3. TTP generates a ciphertext C TTP = SK KTTP [K 1,K 2 ]byusingakeyk TTP and send the ciphertext to Owner 2. 4. Owner 2 send the ciphertext C TTP to T. 5. T decrypts C TTP by using K TTP.IfK 1 is true, T changes the previous key K 1 to the new key K 2. The protocol is shown in Figure 3.

1308 J. Saito, K. Imamoto, and K. Sakurai Owner1 Owner2 TTP K 1 K 1, K 2 C TTP =SK[K 1, K 2 ] C TTP Tag Fig. 3. Owner change scheme in three party model 3.3 Discussion In our scheme, we can change the key on the RFID tag by using TTP. We suppose that the communication channels between previous owner and new owner, and between new owner and TTP are secure respectively. Therefore, an attacker can tap only the communication between new owner and the RFID tag. Moreover, in the communication between new owner and the RFID tag, the new key is encrypted by using the TTP s key which is shared the RFID tag with TTP. Thus, previous owner cannot know the new key because the new key is encrypted by the TTP s key. However, new owner can know a movement history of previous owner because previous owner must give the own key to new owner in our scheme. To solve this problem, previous owner can change a key which should be sent to new owner. In our scheme, we can change a key by ourselves. Therefore, new owner cannot know the movement history of previous owner because previous owner can change a key to change an owner. Moreover, we can prevent ID information from leaking because ID information is encrypted by symmetric key encryption. About tracing ID information, we can prevent by changing the key frequently. Since the ciphertext of ID information is changed by changing the key, we can protect location privacy. However, our scheme is not suitable to changing the key frequently because we must communicate with TTP. But, we can protect location privacy by combining our scheme with other privacy protection scheme like [3, 4, 5].

Reassignment Scheme of an RFID Tag s Key for Owner Transfer 1309 Another problem is tampering with the RFID tag. Since the RFID tag has the symmetric key, an attacker can get the key by tampering with the RFID tag. To protect from tampering, we can use tamper-resistant device to keep the key. However, tamper-resistant device is too expensive for the RFID tag to be used for goods management. 4 Owner Change Scheme on Two Party Model Next, we propose an owner change scheme on two party model. This scheme can be also used with other privacy protection scheme like [3, 4, 5]. In this scheme, we can change a key of an RFID tag without TTP. 4.1 Model We show our model below. T : An RFID tag. It has ID information and a key K 1 which is shared with Owner 1. It generates a ciphertext C = SK K1 [ID] usingk 1.Moreover,it generates a nonce N by using a random number. Owner 1 : Previous owner. It shares a key K 1 with T. Owner 2 : New owner. It receives K 1 from Owner 1 and generates a new key K 2. These shared keys are securely shared in advance. Moreover, we suppose a forward channel and a backward channel [6]. The forward channel is a communication channel from a reader to an RFID tag. It Reader Tag Eavesdropper Backward Range Forward Range (about 100m) Fig. 4. Forward channel and backward channel

1310 J. Saito, K. Imamoto, and K. Sakurai is relatively long range. On the other hand, the backward channel is a communication channel from an RFID tag to a reader. It depends on the capability of the RFID tag. However, the backward channel is shorter than the forward channel. Therefore, it is more difficult to tap the backward channel than the forward channel. We show the relationship between the forward channel and the backward channel in Figure 4. Next, we show our models of communication channels. Owner 1 to Owner 2 : This channel is an existent secure channel. Owner 2 can authenticate Owner 1 and send a message without leakage. Owner 2 to T : This channel is a forward channel by using radio frequency. It is possible to be tapped by an attacker. So, this channel is not secure. T to Owner 2 : This channel is a backward channel by using radio frequency. It is possible to be tapped by an attacker. However, the attacker must approach to tap this channel because this channel is backward channel. Therefore, this channel is more secure than the communication channel from Owner 2 to T. 4.2 Protocol We show our proposed scheme below. 1. Owner 1 gives a key K 1 to Owner 2 by using a secure communication channel. 2. Owner 2 sends a query to T. 3. T generates a nonce N and sends it to Owner 2. Owner1 Owner2 Tag K 1 query N C=SK N [K 1,K 2 ] Fig. 5. Owner change scheme in two party model

Reassignment Scheme of an RFID Tag s Key for Owner Transfer 1311 4. Owner 2 generates a new key K 2 and generates a ciphertext C = SK N [K 1, K 2 ]. Owner 2 send the ciphertext C to T. 5. T decrypts C by using N. IfK 1 is true, T changes a key K 1 to K 2. The protocol is shown in Figure 5. 4.3 Discussion In our scheme, new owner receives a symmetric key from previous owner and changes the key on an RFID tag by using the key. Moreover, we can protect the new key by using a nonce as an encryption key. When the RFID tag sends the nonce, it is difficult to tap the nonce because the communication is backward channel. However, since backward channel is radio frequency, an attacker can approach and tap the nonce. Therefore, when the RFID tag sends the nonce, we can use more short range communication channel like contact communication. Moreover, since we can change a key by ourselves, previous owner can change a key to send it to new owner. 5 Application We show application for our schemes. Our schemes are fit to goods management. When RFID tags are used for goods management, its owner changes from a manufacturer to a distributor, and from a retailer to a consumer. A database keeps history of goods movements. So when consumer buy goods, she can get information about a source of goods and operations in manufacture by accessing the database. But she want that the retailer cannot know RFID tags movement any more. By using our schemes, she can change keys of RFID tags and prevent the retailer from reading RFID tags. 6 Conclusion In this paper, we proposed owner change schemes to protect a new owner s privacy. We proposed two schemes, first is an owner change scheme on three party model and second is an owner change scheme on two party model. In the scheme using TTP, we can prevent a new key from leaking by using a key which is shared an RFID tag with TTP. In the second scheme, we can prevent a key from leaking by supposing backward channel. As a future work, we will evaluate the cost of implementation of our proposed schemes. References 1. A. Juels and R. Pappu, Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, In R. Wright, editor, Financial Cryptography 03, Spring-Verlag, 2003. 2. Gildas Avoine, Privacy Issues in RFID Banknote Protection Schemes, International Conference on Smart Card Research and Advanced Applications - CARDIS, Toulouse, 2004.

1312 J. Saito, K. Imamoto, and K. Sakurai 3. Junichiro Saito, Jae-Cheol Ryou and Kouichi Sakurai, Enhancing privacy of Universal Re-encryption scheme for RFID tags, EUC2004, LNCS Vol.3207. 4. A. Juels, Minimalist Cryptography for RFID tags, Fourth Conference on Security in Communication Networks(SCN 04), 2004. 5. Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita, Cryptographic Approach to a Privacy Friendly Tag, RFID Privacy Workshop, 2003. 6. S. A. Weis, S. Sarma, R. Rivest, and D. Engels, Security and privacy aspects of low-cost radio frequency identification systems, In First International Conference on Security in Pervasive Computing, 2003. 7. A. Juels, R. L. Rivest and M. Szydlo, The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy, ACM Press, 2003.