skip to main content
10.1145/1514274.1514281acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

RFID-based supply chain partner authentication and key agreement

Published: 16 March 2009 Publication History

Abstract

The growing use of RFID in supply chains brings along an indisputable added value from the business perspective, but raises a number of new interesting security challenges. One of them is the authentication of two participants of the supply chain that have possessed the same tagged item, but that have otherwise never communicated before. The situation is even more complex if we imagine that participants to the supply chain may be business competitors. We present a novel cryptographic scheme that solves this problem. In our solution, users exchange tags over the cycle of a supply chain and, if two entities have possessed the same tag, they agree on a secret common key they can use to protect their exchange of business sensitive information. No rogue user can be successful in a malicious authentication, because it would either be traceable or it would imply the loss of a secret key, which provides a strong incentive to keep the tag authentication information secret and protects the integrity of the supply chain. We provide game-based security proofs of our claims, without relying on the random oracle model.

References

[1]
A. Asif and M. Mandviwalla. Integrating the supply chain with rfid: A technical and business analysis. In Communications of the Association for Information Systems, vol. 15, pages 393--427, 2005.
[2]
G. Ateniese, M. Blanton, and J. Kirsch. Secret handshakes with dynamic and fuzzy matching. In Network and Distributed System Security Symposuim, pages 159--177. The Internet Society, 02 2007. CERIAS TR 2007--24.
[3]
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security, 9(1), 2006.
[4]
G. Ateniese and S. Hohenberger. Proxy re-signatures: new definitions, algorithms, and applications. In ACM Conference on Computer and Communications Security, 2005.
[5]
D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon, and H.-C. Wong. Secret handshakes from pairing--based key agreements. In IEEE Symposium on Security and Privacy, pages 180--196, 2003.
[6]
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Conference on Computer and Communications Security, pages 62--73, 1993.
[7]
Y. Bendavid, S. F. Wamba, and L. A. Lefebvre. Proof of concept of an rfid-enabled supply chain in a b2b e-commerce environment. In ICEC '06: Proceedings of the 8th international conference on Electronic commerce, pages 564--568, New York, NY, USA, 2006. ACM.
[8]
M. Blaze, G. Bleumer, and M. Strauss. Divertible protocols and atomic proxy cryptography. In EUROCRYPT, 1998.
[9]
D. Boneh and X. Boyen. Efficient selective-id secure identity-based encryption without random oracles. In EUROCRYPT, pages 223--238, 2004.
[10]
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. SIAM J. Comput., 32(3):586--615, 2003.
[11]
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. Journal of Cryptology, 17(4), 2004.
[12]
R. Canetti and S. Hohenberger. Chosen-ciphertext secure proxy re-encryption. In ACM Conference on Computer and Communications Security, 2007.
[13]
H. Chabanne, D. H. Phan, and D. Pointcheval. Public traceability in traitor tracing schemes. In EUROCRYPT, pages 542--558, 2005.
[14]
W. Diffie and M. Hellman. New directions in cryptography. Information Theory, IEEE Transactions on, 22(6):644--654, Nov 1976.
[15]
S. Garfinkel, A. Juels, and R. Pappu. Rfid privacy: an overview of problems and proposed solutions. Security & Privacy, IEEE, 3(3):34--43, May-June 2005.
[16]
M. Green and G. Ateniese. Identity-based proxy re-encryption. In Conference on Applied Cryptography and Network Security, 2007.
[17]
A. Joux. A one round protocol for tripartite diffie-hellman. Journal of Cryptology, 17(4), 2004.
[18]
A. Juels. RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications, 24(2):381--394, February 2006.
[19]
A. Juels, R. Pappu, and B. Parno. Unidirectional key distribution across time and space with applications to rfid security. In USENIX Security Symposium, 2008.
[20]
A. Juels and S. A. Weis. Defining strong privacy for rfid. Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on, pages 342--347, March 2007.
[21]
S. Lal and P. Kushwah. Multi-pkg id based signcryption. Cryptology ePrint Archive, Report 2008/050, 2008.
[22]
H. Lee and J. Kim. Privacy threats and issues in mobile rfid. Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on, pages 5 pp.--, April 2006.
[23]
B. Libert and D. Vergnaud. Multi-use unidirectional proxy re-signatures. CoRR, abs/0802.1113, 2008.
[24]
B. D. Santos and L. Smith. Rfid in the supply chain: panacea or pandora's box? Communications of the ACM, 51(10), 2008.
[25]
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, pages 47--53, 1984.
[26]
S. F. Wamba and H. Boeck. Enhancing information flow in a retail supply chain using rfid and the epc network. J. Theor. Appl. Electron. Commer. Res., 3(1):92--105, 2008.
[27]
B. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT, pages 114--127, 2005.
[28]
Y. Yousuf and V. Potdar. A survey of rfid authentication protocols. Advanced Information Networking and Applications -- Workshops, 2008. AINAW 2008. 22nd International Conference on, pages 1346--1350, March 2008.

Cited By

View all
  • (2021)An Extended Reselling Protocol for Existing Anti-Counterfeiting SchemesJournal of Sensor and Actuator Networks10.3390/jsan1001001210:1(12)Online publication date: 1-Feb-2021
  • (2021)Stakeholder perspectives and requirements on cybersecurity in EuropeJournal of Information Security and Applications10.1016/j.jisa.2021.10291661(102916)Online publication date: Sep-2021
  • (2020)A Novel RFID-Based Anti-Counterfeiting Scheme for Retail EnvironmentsIEEE Access10.1109/ACCESS.2020.29792648(47952-47962)Online publication date: 2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '09: Proceedings of the second ACM conference on Wireless network security
March 2009
280 pages
ISBN:9781605584607
DOI:10.1145/1514274
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. key agreement
  3. proof of possession
  4. rfid
  5. supply chain

Qualifiers

  • Research-article

Conference

WISEC '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)An Extended Reselling Protocol for Existing Anti-Counterfeiting SchemesJournal of Sensor and Actuator Networks10.3390/jsan1001001210:1(12)Online publication date: 1-Feb-2021
  • (2021)Stakeholder perspectives and requirements on cybersecurity in EuropeJournal of Information Security and Applications10.1016/j.jisa.2021.10291661(102916)Online publication date: Sep-2021
  • (2020)A Novel RFID-Based Anti-Counterfeiting Scheme for Retail EnvironmentsIEEE Access10.1109/ACCESS.2020.29792648(47952-47962)Online publication date: 2020
  • (2017)Proxy Re-EncryptionJournal of Network and Computer Applications10.1016/j.jnca.2017.03.00587:C(193-209)Online publication date: 1-Jun-2017
  • (2017)Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted DatabasesData and Applications Security and Privacy XXXI10.1007/978-3-319-61176-1_18(325-336)Online publication date: 22-Jun-2017
  • (2016)Scalable Industry Data Access Control in RFID-Enabled Supply ChainIEEE/ACM Transactions on Networking10.1109/TNET.2016.253662624:6(3551-3564)Online publication date: 1-Dec-2016
  • (2015)A fair exchange and track system for RFID-tagged logistic chains2015 8th International Conference on Biomedical Engineering and Informatics (BMEI)10.1109/BMEI.2015.7401586(661-666)Online publication date: Oct-2015
  • (2014)Scalable Data Access Control in RFID-Enabled Supply ChainProceedings of the 2014 IEEE 22nd International Conference on Network Protocols10.1109/ICNP.2014.28(71-82)Online publication date: 21-Oct-2014
  • (2014)Approaching the time lower bound on cloned-tag identification for large RFID systemsAd Hoc Networks10.1016/j.adhoc.2013.08.01113(271-281)Online publication date: 1-Feb-2014
  • (2014)Privacy by Encrypted DatabasesPrivacy Technologies and Policy10.1007/978-3-319-06749-0_4(56-69)Online publication date: 2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media