Practical key distribution scheme with less dummy tags in RFID-enabled supply chains

Tatsuaki Sato, Kentaro Toyoda, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In RFID-enabled supply chains, in order to securely deliver products, a secret sharing scheme has been proposed. An encryption key of tags is split into shares and the key can be recovered with the sufficient number of correct shares. The conventional scheme introduces sufficient number of dummy tags with bogus shares and prevents an attacker who reads all tags during shipping from obtaining tag information. The number of required dummy tags is decided so that the success probability of the attack becomes lower than that in the brute force manner. When the number of shipping products is small, too many dummy tags are required to prevent the attacker from selecting correct shares with a small number of trial. In this paper, we propose a practical scheme which reduces the number of tags by using extra legitimate tags. An encryption key and its share for legitimate tags are assigned to not only the conventional legitimate tags but also extra legitimate tags, and thus, the number of legitimate tags is virtually increased. By doing this, the number of required dummy tags can be reduced. Extra legitimate tags are separately composed from conventional legitimate tags and dummy tags, then they can be distinguished easily. We show the effectiveness of our scheme by computer simulation.

Original languageEnglish
Title of host publicationProceedings - Asia-Pacific Conference on Communications, APCC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages476-480
Number of pages5
ISBN (Electronic)9781509006762
DOIs
Publication statusPublished - 2016 Oct 3
Event22nd Asia-Pacific Conference on Communications, APCC 2016 - Yogyakarta, Indonesia
Duration: 2016 Aug 252016 Aug 27

Other

Other22nd Asia-Pacific Conference on Communications, APCC 2016
CountryIndonesia
CityYogyakarta
Period16/8/2516/8/27

Fingerprint

Freight transportation
Radio frequency identification (RFID)
Supply chains
Cryptography
Computer simulation

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Sato, T., Toyoda, K., & Sasase, I. (2016). Practical key distribution scheme with less dummy tags in RFID-enabled supply chains. In Proceedings - Asia-Pacific Conference on Communications, APCC 2016 (pp. 476-480). [7581434] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/APCC.2016.7581434

Practical key distribution scheme with less dummy tags in RFID-enabled supply chains. / Sato, Tatsuaki; Toyoda, Kentaro; Sasase, Iwao.

Proceedings - Asia-Pacific Conference on Communications, APCC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 476-480 7581434.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sato, T, Toyoda, K & Sasase, I 2016, Practical key distribution scheme with less dummy tags in RFID-enabled supply chains. in Proceedings - Asia-Pacific Conference on Communications, APCC 2016., 7581434, Institute of Electrical and Electronics Engineers Inc., pp. 476-480, 22nd Asia-Pacific Conference on Communications, APCC 2016, Yogyakarta, Indonesia, 16/8/25. https://doi.org/10.1109/APCC.2016.7581434
Sato T, Toyoda K, Sasase I. Practical key distribution scheme with less dummy tags in RFID-enabled supply chains. In Proceedings - Asia-Pacific Conference on Communications, APCC 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 476-480. 7581434 https://doi.org/10.1109/APCC.2016.7581434
Sato, Tatsuaki ; Toyoda, Kentaro ; Sasase, Iwao. / Practical key distribution scheme with less dummy tags in RFID-enabled supply chains. Proceedings - Asia-Pacific Conference on Communications, APCC 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 476-480
@inproceedings{2a391a949a4c464bafb40e261c610fa6,
title = "Practical key distribution scheme with less dummy tags in RFID-enabled supply chains",
abstract = "In RFID-enabled supply chains, in order to securely deliver products, a secret sharing scheme has been proposed. An encryption key of tags is split into shares and the key can be recovered with the sufficient number of correct shares. The conventional scheme introduces sufficient number of dummy tags with bogus shares and prevents an attacker who reads all tags during shipping from obtaining tag information. The number of required dummy tags is decided so that the success probability of the attack becomes lower than that in the brute force manner. When the number of shipping products is small, too many dummy tags are required to prevent the attacker from selecting correct shares with a small number of trial. In this paper, we propose a practical scheme which reduces the number of tags by using extra legitimate tags. An encryption key and its share for legitimate tags are assigned to not only the conventional legitimate tags but also extra legitimate tags, and thus, the number of legitimate tags is virtually increased. By doing this, the number of required dummy tags can be reduced. Extra legitimate tags are separately composed from conventional legitimate tags and dummy tags, then they can be distinguished easily. We show the effectiveness of our scheme by computer simulation.",
author = "Tatsuaki Sato and Kentaro Toyoda and Iwao Sasase",
year = "2016",
month = "10",
day = "3",
doi = "10.1109/APCC.2016.7581434",
language = "English",
pages = "476--480",
booktitle = "Proceedings - Asia-Pacific Conference on Communications, APCC 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Practical key distribution scheme with less dummy tags in RFID-enabled supply chains

AU - Sato, Tatsuaki

AU - Toyoda, Kentaro

AU - Sasase, Iwao

PY - 2016/10/3

Y1 - 2016/10/3

N2 - In RFID-enabled supply chains, in order to securely deliver products, a secret sharing scheme has been proposed. An encryption key of tags is split into shares and the key can be recovered with the sufficient number of correct shares. The conventional scheme introduces sufficient number of dummy tags with bogus shares and prevents an attacker who reads all tags during shipping from obtaining tag information. The number of required dummy tags is decided so that the success probability of the attack becomes lower than that in the brute force manner. When the number of shipping products is small, too many dummy tags are required to prevent the attacker from selecting correct shares with a small number of trial. In this paper, we propose a practical scheme which reduces the number of tags by using extra legitimate tags. An encryption key and its share for legitimate tags are assigned to not only the conventional legitimate tags but also extra legitimate tags, and thus, the number of legitimate tags is virtually increased. By doing this, the number of required dummy tags can be reduced. Extra legitimate tags are separately composed from conventional legitimate tags and dummy tags, then they can be distinguished easily. We show the effectiveness of our scheme by computer simulation.

AB - In RFID-enabled supply chains, in order to securely deliver products, a secret sharing scheme has been proposed. An encryption key of tags is split into shares and the key can be recovered with the sufficient number of correct shares. The conventional scheme introduces sufficient number of dummy tags with bogus shares and prevents an attacker who reads all tags during shipping from obtaining tag information. The number of required dummy tags is decided so that the success probability of the attack becomes lower than that in the brute force manner. When the number of shipping products is small, too many dummy tags are required to prevent the attacker from selecting correct shares with a small number of trial. In this paper, we propose a practical scheme which reduces the number of tags by using extra legitimate tags. An encryption key and its share for legitimate tags are assigned to not only the conventional legitimate tags but also extra legitimate tags, and thus, the number of legitimate tags is virtually increased. By doing this, the number of required dummy tags can be reduced. Extra legitimate tags are separately composed from conventional legitimate tags and dummy tags, then they can be distinguished easily. We show the effectiveness of our scheme by computer simulation.

UR - http://www.scopus.com/inward/record.url?scp=84994666108&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84994666108&partnerID=8YFLogxK

U2 - 10.1109/APCC.2016.7581434

DO - 10.1109/APCC.2016.7581434

M3 - Conference contribution

AN - SCOPUS:84994666108

SP - 476

EP - 480

BT - Proceedings - Asia-Pacific Conference on Communications, APCC 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -