Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains
Abstract
:1. Introduction
1.1. Our Contributions
1.2. Related Work
1.3. Organization
2. Preliminaries
2.1. Supply Chain
2.2. Track and Trace System
3. Security Requirements
3.1. Authenticity
Experiment |
(1) initialize the Tracker system through Initialize(); |
(2) choose an honest party ; |
(3) ; //learning stage |
(4) ; //challenge stage |
(5) Read |
(6) if Check() and tag has not been through the step and |
then output 1; 0 otherwise. |
3.2. Privacy
Experiment |
(1) initialize the Tracker system through Initialize(); |
(2) chooses a step |
(3) ; //learning stage |
(4) choose randomly bit |
(5) if then choose a tag that does not go through |
else choose a tag which goes through |
(6) operate GoNext(); |
(7) ; //challenge stage |
(8) if then output 1, 0 otherwise. |
3.3. Unlinkability
3.3.1. Path Unlinkability
Experiment |
(1) initialize the Tracker system through Initialize(); |
(2) chooses a tag ; Let denote the path took; |
(3) ; //learning stage |
(4) choose randomly bit |
(5) if then choose a tag that does not go through , |
else choose a tag which goes through |
(6) operate GoNext(); |
(7) ; //challenge stage |
(8) if then output 1; 0 otherwise. |
3.3.2. Tag Unlinkability
Experiment |
(1) initialize the Tracker system through Initialize(); |
(2) ; //learning stage |
(3) ; |
(4) GoNext(); |
(5) ; //challenge stage |
(6) if then output 1, 0 otherwise. |
4. Relations among Privacy Models
5. The Tracker+
5.1. Path Encoding
5.2. Multiple ElGamal Encryption and HMAC
5.3. Detailed Description of Tracker+
- Function
- (1) Parse as ;
- (2) Choose random number
- (3) Compute , and ;
- (4) Compute ;
- (5) Return
- End Function
6. Analysis
6.1. HMAC Security
6.2. Semantic Security
6.3. Security of Tracker+
6.4. Efficiency and Comparisons
Storage requirement | Privacy | Tag unlinkability | Path unlinkability | Inside attacks | |
---|---|---|---|---|---|
Tracker[1] | 800 bits | N | Y | Y | N |
Tracker+ | 640 bits | Y | Y | Y | Y |
7. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Blass, E.-O.; Elkhiyaoui, K.; Molva, R. Tracker: Security and Privacy for RFID-based Supply Chains. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS’11), San Diego, CA, USA, 2–9 February 2011; pp. 455–472.
- EPCglobal. EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocols for Communications at 860 Mhz–960 Mhz; Version 1.2.0; Epcglobal, Inc.: Lawrenceville, NJ, USA, 2008. [Google Scholar]
- Krawczyk, H.; Bellare, M.; Canetti, R. HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104; IETF: Reston, VA, USA, 1997. [Google Scholar]
- Juels, A. RFID Security and Privacy: A Research Survey. IEEE J. Sel. Areas Commun. 2006, 24, 381–394. [Google Scholar] [CrossRef]
- Avoine, G. RFID Security & Privacy Lounge. Available online: http://www.avoine.net/rfid/ (accessed on 5 June 2015).
- Ateniese, G.; Camenisch, J.; de Medeiros, B. Untraceable RFID Tags via Insubvertible Encryption. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS’05), Alexandria, VA, USA, 7–11 November 2005; pp. 92–101.
- Burmester, M.; van Le, T.; de Medeiros, B. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks (SecureComm’06), Baltimore, MD, USA, 28 August–1 September 2006; pp. 1–9.
- Juels, A.; Weis, S. Authenticating Pervasive Devices with Human Protocols. In Proceedings of the 25th Annual International Cryptology Conference (CRYPTO’05), Santa Barbara, CA, USA, 14–18 August 2005; pp. 293–308.
- Molnar, D.; Soppera, A.; Wagner, D. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In Proceedings of the 12th International Conference on Selected Areas in Cryptography (SAC’05), Kingston, ON, Canada, 11–12 August 2005; pp. 276–290.
- Ohkubo, M.; Suzuki, K.; Kinoshita, S. Efficient Hash-Chain Based RFID Privacy Protection Scheme. In Proceedings of the 6th International Conference on Ubiquitous Computing (Ubicomp’04), Nottingham, UK, 11–14 September 2004.
- Peris-Lopez, P.; Hemandez-Castro, J.C.; Estevez-Tapiador, J.M.; Ribagorda, A. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags. In Proceedings of the Workshop on RFID Security 2006 (RFIDSec’06), Graz, Austria, 12–14 July 2006.
- Tsudik, G. YA-TRAP: Yet another Trivial RFID Authentication Protocol. In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom’06), Pisa, Italy, 13–17 March 2006; pp. 640–643.
- Weis, S.; Sarma, S.; Rivest, R.; Engels, D. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Proceedings of the 1st International Conference on Security in Pervasive Computing (SPC’03), Washington, DC, USA, 12–14 March 2003; pp. 454–469.
- Ouafi, K.; Vaudenay, S. Pathchecker: An RFID Application for Tracing Products in Supply-Chains. In Proceedings of the Workshop on RFID Security 2009 (RFIDSec’09), Leuven, Belgium, 30 June–2 July 2009; pp. 1–14.
- Li, Y.; Ding, X. Protecting RFID Communications in Supply Chains. In Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS’07), Singapore, 20–22 March 2007; pp. 234–241.
- Ma, C.; Li, Y.; Deng, R.; Li, T. RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), Chicago, IL, USA, 9–13 November 2009; pp. 54–65.
- ElGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
© 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, X.; Zhu, Y.; Li, J.; Wen, Y.; Gong, Z. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains. Information 2015, 6, 258-274. https://doi.org/10.3390/info6020258
Chen X, Zhu Y, Li J, Wen Y, Gong Z. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains. Information. 2015; 6(2):258-274. https://doi.org/10.3390/info6020258
Chicago/Turabian StyleChen, Xunjun, Yuelong Zhu, Jiguo Li, Yamin Wen, and Zheng Gong. 2015. "Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains" Information 6, no. 2: 258-274. https://doi.org/10.3390/info6020258
APA StyleChen, X., Zhu, Y., Li, J., Wen, Y., & Gong, Z. (2015). Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains. Information, 6(2), 258-274. https://doi.org/10.3390/info6020258