inis 15(5): e4

Research Article

Light-weight Key Management Scheme for Active RFID Applications

Download907 downloads
  • @ARTICLE{10.4108/eai.17-9-2015.150286,
        author={Mohammad  Fal Sadikin and Marcel  Kyas},
        title={Light-weight Key Management Scheme for Active RFID Applications},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={2},
        number={5},
        publisher={EAI},
        journal_a={INIS},
        year={2015},
        month={9},
        keywords={RFID and Sensor Node Integration; Key Management System; Security and Privacy; Industrial Applications},
        doi={10.4108/eai.17-9-2015.150286}
    }
    
  • Mohammad Fal Sadikin
    Marcel Kyas
    Year: 2015
    Light-weight Key Management Scheme for Active RFID Applications
    INIS
    EAI
    DOI: 10.4108/eai.17-9-2015.150286
Mohammad Fal Sadikin1,*, Marcel Kyas1
  • 1: AG Computer Systems & Telematics, Freie Universität Berlin, Germany
*Contact email: fal.sadikin@fu-berlin.de

Abstract

Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys). On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.