Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Information Security Tech. Report
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Forward secure privacy protection scheme for rfid system using advanced encryption standard
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Hi-index | 0.00 |
We are sure that RFID system should be a widely used automatic identification system because of its various advantages and applications. However, many people know that invasion of privacy in RFID system is a still critical problem that makes it difficult to be used widely. Many works for solving this problem have focused on developing light-weight cryptographic modules inside of an RFID tag and building communication protocols with the reader or the back-end server. Another approach is use of proxy agents that control communications between the tag and the reader for protecting privacy. In this paper, we present an enhanced version of MARP scheme. We modified the original MARP scheme for reducing the probability of preventing attacker's eavesdropping and for reducing the communication number of tags. And back-end servers can authenticate mobile agents more easily using public key cryptography in this scheme. Enhanced MARP scheme guarantees not only privacy protection but also forgery detection, and it only needs slight modification in the current tag hardware.