Practical Key Distribution Scheme with Less Dummy Tags in RFID-enabled Supply Chains

被引:0
|
作者
Sato, Tatsuaki [1 ]
Toyoda, Kentaroh [1 ]
Sasase, Iwao [1 ]
机构
[1] Keio Univ, Dept Informat & Comp Sci, Kohoku Ku, 3-14-1 Hiyoshi, Yokohama, Kanagawa 2238522, Japan
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In RFID-enabled supply chains, in order to securely deliver products, a secret sharing scheme has been proposed. An encryption key of tags is split into shares and the key can be recovered with the sufficient number of correct shares. The conventional scheme introduces sufficient number of dummy tags with bogus shares and prevents an attacker who reads all tags during shipping from obtaining tag information. The number of required dummy tags is decided so that the success probability of the attack becomes lower than that in the brute force manner. When the number of shipping products is small, too many dummy tags are required to prevent the attacker from selecting correct shares with a small number of trial. In this paper, we propose a practical scheme which reduces the number of tags by using extra legitimate tags. An encryption key and its share for legitimate tags are assigned to not only the conventional legitimate tags but also extra legitimate tags, and thus, the number of legitimate tags is virtually increased. By doing this, the number of required dummy tags can be reduced. Extra legitimate tags are separately composed from conventional legitimate tags and dummy tags, then they can be distinguished easily. We show the effectiveness of our scheme by computer simulation.
引用
收藏
页码:476 / 480
页数:5
相关论文
共 50 条
  • [1] Secret Sharing Based Unidirectional Key Distribution with Dummy Tags in Gen2v2 RFID-enabled Supply Chains
    Toyoda, Kentaroh
    Sasase, Iwao
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2015, : 63 - 69
  • [2] Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains
    Abughazalah, Sarah
    Markantonakis, Kostantinos
    Mayes, Keith
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 871 - 878
  • [3] Identifying Discrepant Tags in RFID-enabled Supply Chains
    Gu, Caidong
    Gong, Wei
    Nayak, Amiya
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 162 - 173
  • [4] Illegal Interrogation Detectable Products Distribution Scheme in RFID-Enabled Supply Chains
    Toyoda, Kentaroh
    Sasase, Iwao
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (04) : 820 - 829
  • [5] Illegal Interrogation Detectable EPC Distribution Scheme in RFID-enabled Supply Chains
    Toyoda, Kentaroh
    Sasase, Iwao
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS (RFID-TA), 2015, : 159 - 164
  • [6] Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
    Cai, Shaoying
    Li, Tieyan
    Ma, Changshe
    Li, Yingjiu
    Deng, Robert H.
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 150 - +
  • [7] A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains
    Xie, Xin
    Liu, Xiulong
    Guo, Song
    Qi, Heng
    Li, Keqiu
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [8] Understanding data volume problems of RFID-enabled supply chains
    Ilic, Alexander
    Groessbauer, Andrea
    Michahelles, Florian
    Fleisch, Elgar
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2010, 16 (06) : 904 - 916
  • [9] Semantic access control model for RFID-enabled supply chains
    Li Z.
    Chu C.-H.
    Yao W.
    [J]. Cryptology and Information Security Series, 2010, 4 : 95 - 108
  • [10] Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
    Cai, Shaoying
    Li, Yingjiu
    Zhao, Yunlei
    [J]. INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 501 - 512