Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains

Kentaro Toyoda, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

Recently, a secret sharing scheme is found to be effective to solve the key distribution problem between parties in RFID-enabled supply chains. However, there is a problem that an attacker might recover the legitimate key by collecting sufficient secret shares when products are carried in the public transportation. In this paper, we propose an effective secret sharing scheme by introducing sufficient number of dummy tags which possess a bogus secret share when the tag-attached products are conveyed. Since an attacker cannot see the tags themselves from the outside of the carrying vehicle, he/she cannot distinguish between the legitimate tags and dummy tags and thus has to find out the correct key by iteratively trying each combination of secret shares. On the other hand, the party who receives products can distinguish dummy tags since they are not attached to any product. We also adopt a file privilege and untraceable option which are newly ratified by Gen2v2 (Gen2 version 2) to realize secure and practical RFID-enabled supply chains. We prove that our construction is secure in both the privacy and robustness aspect. We also confirm that our scheme is easily implemented with the off-the-shelf RFID reader and tags.

Original languageEnglish
Title of host publication2015 IEEE International Conference on RFID, RFID 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages63-69
Number of pages7
ISBN (Print)9781479919376
DOIs
Publication statusPublished - 2015 May 26
Event2015 IEEE International Conference on RFID, RFID 2015 - San Diego, United States
Duration: 2015 Apr 152015 Apr 17

Other

Other2015 IEEE International Conference on RFID, RFID 2015
Country/TerritoryUnited States
CitySan Diego
Period15/4/1515/4/17

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains'. Together they form a unique fingerprint.

Cite this