Authenticated, private, and secured Smart Cards (APS-SC)

被引:0
|
作者
Szu, Harold [1 ]
Mehmood, Amir [1 ]
机构
[1] GWU, Digital Media RF Lab, Washington, DC USA
关键词
RFID hybrid protection; Smart Card; passport; price tag; library;
D O I
10.1117/12.684205
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3(rd) Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware-software combined hybrid approach because of a too limited phase space of a single RFID for any meaningful encryption approach. Furthermore, a useful biological lesson is not to put all eggs in one basket, "if you don't get it all, you can't hack it". According to the Radar physics, we can choose the amplitude, the frequency, the phase, the polarization, and two radiation energy supply principles, the capacitance coupling (similar to 6m) and the inductance coupling (< 1m), to code the pair of tags differently. A casual skimmer equipped with single-mode reader can not read all. We consider near-field and mid-field applications each in this paper. The near-field is at check-out counters or the convey-belt inventory involving sensitive and invariant data. The mid-field search & rescue involves not only item/person identification, but also the geo-location. If more RF power becomes cheaper & portable for longer propagation distance in the near future, then a triangulation with pair of secured readers, located at known geo-locations, could interrogate and identify items/persons and their locations in a GPS-blind environment.
引用
收藏
页数:14
相关论文
共 38 条
  • [2] Password authenticated key agreement with smart cards for remote systems
    Tang, Anyang
    Xu, Chunxiang
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 484 - +
  • [3] Efficient password authenticated key agreement using smart cards
    Juang, WS
    [J]. COMPUTERS & SECURITY, 2004, 23 (02) : 167 - 173
  • [4] Novel authentication model based on secured IP smart cards
    Zouari, B
    Afifi, H
    Hecker, A
    Labiod, H
    Pujolle, G
    Urien, P
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 809 - 813
  • [5] Security of efficient password authenticated key agreement using smart cards
    Shieh, Wen-Gong
    [J]. WSEAS Transactions on Information Science and Applications, 2006, 3 (01): : 187 - 191
  • [6] Robust and efficient password-authenticated key agreement using smart cards
    Juang, Wen-Shenq
    Chen, Sian-Teng
    Liaw, Horng-Twu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2008, 55 (06) : 2551 - 2556
  • [7] An Enhanced Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    Kuol, Wen-Chung
    Chain, Kai
    Cheng, Jiin-Chiou
    Yang, Jar-Ferr
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 127 - 132
  • [8] Efficient multi-server password authenticated key agreement using smart cards
    Juang, WS
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 251 - 255
  • [9] Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    Li, Xiangxue
    Qiu, Weidong
    Zheng, Dong
    Chen, Kefei
    Li, Jianhua
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (02) : 793 - 800
  • [10] An efficient multi-server password authenticated key agreement scheme using smart cards
    Hu, Lanlan
    Niu, Xinxin
    Yang, Yixian
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 903 - +