eMARP: Enhanced mobile agent for RFID privacy protection and forgery detection

被引:0
|
作者
Yeo, Sang-Soo [1 ]
Kim, Soo-Cheol [2 ]
Kim, Sung Kwon [2 ]
机构
[1] Kyushu Univ, Dept Comp Sci & Commun Engn, Fukuoka 812, Japan
[2] Chung Ang Univ, Sch Comp Sci & Engn, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We are sure that RFID system should be a widely used automatic identification system because of its various advantages and applications. However, many people know that invasion of privacy in RFID system is a still critical problem that makes it difficult to be used widely. Many works for solving this problem have focused on developing lightweight cryptographic modules inside of an RFID tag and building communication protocols with the reader or the back-end server. Another approach is use of proxy agents that control communications between the tag and the reader for protecting privacy. In this paper, we present an enhanced version of MARP scheme. We modified the original MARP scheme for reducing the probability of preventing attacker's eavesdropping and for reducing the communication number of tags. And back-end servers can authenticate mobile agents more easily using public key cryptography in this scheme. Enhanced MARP scheme guarantees not only privacy protection but also forgery detection, and it only needs slight modification in the current tag hardware.
引用
收藏
页码:318 / +
页数:3
相关论文
共 50 条
  • [31] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [32] Privacy Enhanced Mobile Authentication
    G. M. Køien
    Wireless Personal Communications, 2007, 40 : 443 - 455
  • [33] Privacy enhanced mobile authentication
    Koien, G. M.
    WIRELESS PERSONAL COMMUNICATIONS, 2007, 40 (03) : 443 - 455
  • [34] Privacy negotiation using a mobile agent
    Kalyani, Yogesh
    Adams, Carlisle
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 343 - +
  • [35] Data privacy in mobile agent communication
    Adane, D. S.
    Adane, P. D.
    Sathe, S. R.
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 126 - +
  • [36] Study on Privacy Protection in Mobile Business
    Qin Cheng-De
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 345 - 350
  • [37] Mobile payment system with privacy protection
    Sue, KL
    Hsieh, WP
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 795 - 800
  • [38] Proxy framework for enhanced RFID security and privacy
    Dimitriou, Tassos
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 843 - 847
  • [39] Practical Schemes for Privacy and Security Enhanced RFID
    Hoepman, Jaap-Henk
    Joosten, Rieks
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 138 - 153
  • [40] Privacy protection scheme of RFID using random number
    Kang, Soo-Young
    Lee, Im-Yeong
    EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 596 - 607