DocumentCode
2076341
Title
A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service
Author
Bai Enjian ; Ge Huayong ; Wu Kejia ; Zhang Wen
Author_Institution
Coll. of Inf. Sci. & Technol., Donghua Univ., Shanghai, China
fYear
2009
fDate
24-26 Sept. 2009
Firstpage
1
Lastpage
5
Abstract
The mobile radio frequency identification (MRFID) system, defined as a special type of mobile service using RFID tag packaging object and RFID readers attached to mobile RFID terminals, has been studied actively in recent years. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among tag, reader and server, are deeply concerned by individuals and scholars. Most of previous works utilize the principle of cryptography to solve these problems. Although the heart of any security schemes is the key management protocol responsible for the distribution of secret keys, as we know, few studies address this fundamental issue in the research of secure RFID. In this paper, we assume that all the communication channels among tag, reader, and server are insecure. We propose a trust-third-party based key management protocol to construct a secure session key among the tag, reader and server. The proposed protocol has the following four advantages: First, the communication between reader and server is anonymous, which provides the privacy of reader. Second, the dynamic tag identity can prevent the tag owner being tracked. Third, the secure session key construction among tag, reader and server can ensure the security of information transmission. Last, the system performance is ensured by the application of privacy-protection-policy based access control mechanism in the M-RFID system.
Keywords
cryptographic protocols; data privacy; mobile radio; radiofrequency identification; telecommunication security; access control mechanism; consumer tracking; cryptography; privacy violation problem; privacy-protection-policy; radio frequency identification; secure mobile RFID service; secure session key construction; sensitive information transmission; trust-third-party based key management protocol; Cryptography; Frequency; Heart; Information security; Land mobile radio; Packaging; Privacy; Protocols; RFID tags; Radiofrequency identification;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-3692-7
Electronic_ISBN
978-1-4244-3693-4
Type
conf
DOI
10.1109/WICOM.2009.5301159
Filename
5301159
Link To Document