DOI QR코드

DOI QR Code

Analyses of Security, Privacy Issues and Challenges for RFID System

  • 투고 : 2011.10.23
  • 심사 : 2011.11.30
  • 발행 : 2011.12.31

초록

RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

키워드

참고문헌

  1. Raphael C.-W. Phan, "Cryptanalysis of a New Ultra-lightweight RFID Authentication Protocol-SASI", IEEE Transaction on Dependable and Secure Computing, V.6, N.4, pp.316-320, Oct 2009 https://doi.org/10.1109/TDSC.2008.33
  2. George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
  3. Dong-liang Wu, "A brief Survey on Current RFID Application", Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009, pp.2330-2335
  4. S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.A
  5. M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.31, n.56, pp.357-370, 2004
  6. Yanjun Zuo, "Survivable RFID Systems: Issues, Challenges, and Techniques", IEEE Transaction on Systems Man and Cybernetics,-Part C: Applications and reviews, v. 40, n. 4, pp. 406-418, July 2010
  7. P. Peris-Lopez, etcs, "LMAP: A Real Lightweight Low-cost RFID Tags", Proc. Second Workshop RFID Security, July, 2006
  8. P. Peris-Lopez, etcs, "EMAP: An Efficient Mutal Authentication Protocol for Low-Cost RFIDs", Proc. OTM Federated Conf and Workshop: IS Workshop, Nov. 2006
  9. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg, 2006
  10. Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008
  11. Selwyn Piramuthu, "Lightweight Cryptographic Authentication in Passive RFID Tagged Systems," IEEE Tran. On Systems, Man, and Cybernetics-Part C: Applications and review, v.38, n.3, pp.360-376, May 2008 https://doi.org/10.1109/TSMCC.2007.913918
  12. P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Rib-agorda, "RFID systems: A survey on security threats and proposed solutions," in 11th IFIP International Conference on Personal Wireless Communications - PWC06, ser. Lecture Notes in Computer Science, vol.4217. Springer-Verlag, September 2006, pp. 159-170.
  13. Ari Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal of selected areas in communications, V.24, N.2, pp.381-394, February, 2006 https://doi.org/10.1109/JSAC.2005.861395
  14. P. Ekdahl, and T. Johansson, "Another attack on A5/1", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003A https://doi.org/10.1109/TIT.2002.806129
  15. Martin Feldhofer, "Strong crypto for RFID Tag, - A comparison of low power hardware implementation", 2007 IEEE, pp.1839-1842
  16. Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Trans. on Network and Service Management, V. 6, N. 3, pp.190-205, Sep. 2009. https://doi.org/10.1109/TNSM.2009.03.090305
  17. J.D.H, etcs, "Strong Authentication and improving privacy with ultra-weight RFID authentication Protocol", KIISC, v.19, n.19, pp.81-91, 2009
  18. P. Peris-Lopez, etcs, "M2AP: A Minimalist mutual authentication Protocol for Low-cost RFID Tags", Proc. Int' Conf Ubiquitous Intelligence and Computing, pp.912-923, 2006.
  19. H.Y. Chien. "SASI: A New Ultra-weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing., vol.4, n.4, pp.337-340, Oct. 2007 https://doi.org/10.1109/TDSC.2007.70226
  20. Karygiannis, "Karygianni's Taxonomy Model in RFID Threats", 2008 11th IEEE International Conference on Communication Technology Proceedings, pp.765-768