Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

Research Article

Secure and Practical Key Distribution for RFID-Enabled Supply Chains

Download
248 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-31909-9_20,
        author={Tieyan Li and Yingjiu Li and Guilin Wang},
        title={Secure and Practical Key Distribution for RFID-Enabled Supply Chains},
        proceedings={Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={10},
        keywords={RFID security privacy key distribution secret sharing},
        doi={10.1007/978-3-642-31909-9_20}
    }
    
  • Tieyan Li
    Yingjiu Li
    Guilin Wang
    Year: 2012
    Secure and Practical Key Distribution for RFID-Enabled Supply Chains
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-31909-9_20
Tieyan Li1,*, Yingjiu Li2,*, Guilin Wang3,*
  • 1: Irdeto (Cloakware) Beijing
  • 2: Singapore Management University
  • 3: University of Wollongong
*Contact email: li.tieyan@irdeto.com, yjli@smu.edu.sg, Guilin@uow.edu.au

Abstract

In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle the secure key distribution problem on a base. In our model, we focus on any pair of consecutive parties along a supply chain, who agreed on a transaction and based on which, certain RFID-tagged goods are to be transferred by a third party from one party to the other as in common supply chain practice. Under a strong adversary model, we identify and define the security requirements with those parties during the delivery process. To meet the security goal, we first propose a resilient secret sharing (RSS) scheme for key distribution among the three parties and formally prove its security against and adversaries. In our construction, the shared (and recovered) secrets can further be utilized properly on providing other desirable security properties such as tag authenticity, accessibility and privacy protection. Compared with existing approaches, our work is more resilient, secure and provides richer features in supply chain practice. Moreover, we discuss the parameterization issues and show the flexibility on applying our work in real-world deployments.