A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service

被引:0
|
作者
Bai Enjian [1 ]
Ge Huayong [1 ]
Wu Kejia [1 ]
Zhang Wen [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai, Peoples R China
关键词
mobile RFID; security and privacy; key management protocol; trust third party;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Mobile Radio Frequency Identification (M-RFID) system, defined as a special type of mobile service using RFID tag packaging object and RFID readers attached to mobile RFID terminals, has been studied actively in recent years. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among Tag, Reader and Server, are deeply concerned by individuals and scholars. Most. of previous works utilize the principle of cryptography to solve these problems. Although the heart of any security schemes is the key management protocol responsible for the distribution of secret keys, as we know, few studies address this fundamental issue in the research of secure RFID. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We propose a Trust-Third-Party based key management protocol to construct a secure session key among the tag, reader and server. The proposed protocol has the following four advantages: First, the communication between Reader and Server is anonymous, which provides the privacy of reader. Second, the dynamic tag identity can prevent the tag owner being tracked. Third, the secure session key construction among tag, reader and server can ensure the security of information transmission. Last, the system performance is ensured by the application of privacy-protection-policy based access control mechanism in the M-RFID system.
引用
收藏
页码:3740 / 3744
页数:5
相关论文
共 50 条
  • [1] A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service Based on the Internet of Things
    Yan, Tao
    Wen, Qiaoyan
    [J]. KNOWLEDGE DISCOVERY AND DATA MINING, 2012, 135 : 201 - 208
  • [2] Mutual authentication and key distribution protocol based on the Trust-Third-Party in mobile RFID environment
    Xu Fangfang
    Yang Zhao
    Yang Bo
    [J]. PROCEEDINGS OF THE 2018 13TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2018), 2018, : 2501 - 2509
  • [3] Secure key exchange protocol using graph and trusted third party
    Deshmukh, Maroti
    Rawat, Arjun Singh
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04)
  • [4] Scheme and Secure Protocol of Mobile Payment Based on RFID
    Fu, Yuli
    Fu, Qi
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 631 - 634
  • [5] Mobile Commerce Trust Model and Its Application for Third Party Trust Service Platform
    Piao, Chunhui
    Wang, Shuzhen
    Wen, Jie
    Luo, Yongchun
    [J]. PROCEEDINGS OF THE 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMERCE AND ENTERPRISE COMPUTING (CEC 2012), 2012, : 120 - 125
  • [6] Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment
    Diaz-Sanchez, Daniel
    Marin, Andres
    Almenarez, Florina
    Campo, Celeste
    Cortes, Alberto
    Garcia-Rubio, Carlos
    [J]. WIRELESS AND MOBILE NETWORKING, 2008, 284 : 271 - 282
  • [7] A key management scheme for secure Mobile IP registration based on AAA protocol
    Kang, Hyun-Sun
    Park, Chang-Seop
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (06): : 1842 - 1846
  • [8] Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of Things (IoT)
    Jamshiya, P. K.
    Menon, Divya M.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1834 - 1838
  • [9] Key Management Approach for Secure Mobile Open IPTV Service
    Doh, Inshil
    Lim, Jiyoung
    Chae, Kijoon
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 843 - 864
  • [10] A Secure Key Agreement Protocol Defiant to Denial-of-Service Attack based on Three Party Authentication
    Chunka C.
    Banerjee S.
    Nag S.
    Goswami R.S.
    [J]. Journal of The Institution of Engineers (India): Series B, 2022, 103 (02) : 329 - 340