DOI QR코드

DOI QR Code

Analyses of Security and Privacy Issues in Ultra-weight RFID Protocol

  • Kim, Jung-Tae (Department of Electronic Engineering, Mokwon University)
  • Received : 2011.07.22
  • Accepted : 2011.08.03
  • Published : 2011.08.31

Abstract

Radio frequency identification (RFID) tags are cheap and simple devices that can store unique identification information and perform simple computation to keep better inventory of packages. Security protocol for RFID tags is needed to ensure privacy and authentication between each tag and their reader. In order to accomplish this, in this paper, we analyzed a lightweight privacy and authentication protocol for passive RFID tags.

Keywords

References

  1. Raphael C.-W. Phan, "Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI", IEEE Transaction on Dependable and Secure Computing, V.6, N.4, pp.316-320, OCTOBER-DECEMBER 2009 https://doi.org/10.1109/TDSC.2008.33
  2. I. Vajda and L. Buttyan, "Lightweight authentication protocols for low cost RFID tags," in Proc, 2nd Workshop on Security in Ubiquitous Computer, 2003, pp.76-82
  3. M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.3156, pp.357-370, 2004.
  4. Martin Feldhofer, "Strong crypto for RFID Tag, - A comparison of low power hardware implementation", 2007 IEEE, pp. 1839-1842.
  5. Yanjun Zuo, "Survivable RFID Systems: Issues, Challenges, and Techniques", IEEE Transaction on Systems Man and Cybernetics,-PART C: Applications and reviews, V. 40, N. 4, pp. 406-418, JULY 2010.
  6. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361, Springer, Heidelberg, 2006
  7. Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008