A trust-third-party based key management protocol for secure mobile RFID service

  • Authors:
  • Bai Enjian;Ge Huayong;Wu Kejia;Zhang Wen

  • Affiliations:
  • College of Information Science & Technology, Donghua University, Shanghai, China;College of Information Science & Technology, Donghua University, Shanghai, China;College of Information Science & Technology, Donghua University, Shanghai, China;College of Information Science & Technology, Donghua University, Shanghai, China

  • Venue:
  • WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Mobile Radio Frequency Identification (M-RFID) system, defined as a special type of mobile service using RFID tag packaging object and RFID readers attached to mobile RFID terminals, has been studied actively in recent years. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among Tag, Reader and Server, are deeply concerned by individuals and scholars. Most of previous works utilize the principle of cryptography to solve these problems. Although the heart of any security schemes is the key management protocol responsible for the distribution of secret keys, as we know, few studies address this fundamental issue in the research of secure RFID. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We propose a Trust-Third-Party based key management protocol to construct a secure session key among the tag, reader and server. The proposed protocol has the following four advantages: First, the communication between Reader and Server is anonymous, which provides the privacy of reader. Second, the dynamic tag identity can prevent the tag owner being tracked. Third, the secure session key construction among tag, reader and server can ensure the security of information transmission. Last, the system performance is ensured by the application of privacy-protectionpolicy based access control mechanism in the M-RFID system.