Show simple item record

dc.contributor.authorWang, Junyu
dc.contributor.authorFloerkemeier, Christian
dc.contributor.authorSarma, Sanjay Emani
dc.date.accessioned2016-07-28T18:31:51Z
dc.date.available2016-07-28T18:31:51Z
dc.date.issued2014-08
dc.date.submitted2014-02
dc.identifier.issn1617-4909
dc.identifier.issn1617-4917
dc.identifier.urihttp://hdl.handle.net/1721.1/103797
dc.description.abstractRadio frequency identification (RFID) is an important technique used for automatic identification and data capture. In recent years, low-cost RFID tags have been used in many open-loop applications beyond supply chain management, such as the tagging of the medicine, clothes, and belongings after the point of sales. At the same time, with the development of semiconductor industry, handheld terminals and mobile phones are becoming RFID-enabled. Unauthorized mobile RFID readers could be abused by the malicious hackers or curious common people. Even for authorized RFID readers, the ownership of the reader can be transferred and the owners of the authorized mobile reader may not be always reliable. The authorization and authentication of the mobile RFID readers need to take stronger security measures to address the privacy or security issues that may arise in the emerging open-loop applications. In this paper, the security demands of RFID tags in emerging open-loop applications are summarized, and two example protocols for authorization, authentication and key establishment based on symmetric cryptography are presented. The proposed protocols adopt a timed-session-based authorization scheme, and all reader-to-tag operations are authorized by a trusted third party using a newly defined class of timed sessions. The output of the tags is randomized to prevent unauthorized tracking of the RFID tags. An instance of the protocol A is implemented in 0.13-μm CMOS technology, and the functions are verified by field programmable gate array. The baseband consumes 44.0 μW under 1.08 V voltage and 1.92 MHz frequency, and it has 25,067 gate equivalents. The proposed protocols can successfully resist most security threats toward open-loop RFID systems except physical attacks. The timing and scalability of the two protocols are discussed in detail.en_US
dc.publisherSpringer Londonen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/s00779-014-0788-xen_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceSpringer Londonen_US
dc.titleSession-based security enhancement of RFID systems for emerging open-loop applicationsen_US
dc.typeArticleen_US
dc.identifier.citationWang, Junyu, Christian Floerkemeier, and Sanjay E. Sarma. “Session-Based Security Enhancement of RFID Systems for Emerging Open-Loop Applications.” Personal and Ubiquitous Computing 18.8 (2014): 1881–1891.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Mechanical Engineeringen_US
dc.contributor.mitauthorSarma, Sanjay Emanien_US
dc.relation.journalPersonal and Ubiquitous Computingen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2016-05-23T12:08:45Z
dc.language.rfc3066en
dc.rights.holderSpringer-Verlag London
dspace.orderedauthorsWang, Junyu; Floerkemeier, Christian; Sarma, Sanjay E.en_US
dspace.embargo.termsNen
dc.identifier.orcidhttps://orcid.org/0000-0003-2812-039X
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record