Browse > Article

A Secure Protocol for High-Performance RFID Tag  

Park, Jin-Sung ((주)CEN 연구소)
Choi, Myung-Ryul (한양대학교 전자컴퓨터공학부)
Publication Information
The Transactions of the Korean Institute of Electrical Engineers P / v.54, no.4, 2005 , pp. 217-223 More about this Journal
Abstract
In this paper, we have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.
Keywords
RFID; Authentication protocol; Privacy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A.Juels, .R.Pappu, 'Squealing Euros: Privacy Protection in RFID-Enabled Banknotes', Financial Cryptography '03, LNCS 2742, pp.103-121, 2003
2 A.Juels, R.L.Rivest, and M.Szydlo, 'The Blocker Tag : Selective Blocking of RFID tags for Consumer Privacy', 10th ACM Conference on Computer and Communications Security, CCS 2003, pp.103-111, 2003
3 S.A.Weis, 'Security and Privacy in Radio-Frequency Identification Devices', MIT, Masters thesis, 2003
4 ISO/IEC, 'Information technology - Radio-frequency identification for item management - Part 6 : Parameters for air interface communications at 860 MHz to 960 MHz', International Standard, ISO, 2005
5 유성호, 김기현, 황용호, 이필중, '상태기반 RFID 인증 프로토콜', 정보보호학회논문지 제14권 제5호, pp. 57-68, 2004
6 S.E.Sarma, S.A.Weis, and D.W.Engels, 'RFID ystems, Security & Privacy Implications', White Paper, uto-ID Center, MIT, 2002
7 M.Feldhofer, 'A Proposal for an Authentication Protocol in a Security Layer for RFID Smart Tags', MELECON 2004 IEEE Proceedings, pp.759-762, 2004
8 GlobalPlatform, 'Card Specification Version 2.1.1', GlobalPlatform, 2003
9 강전일, 박주성, 양대헌, 'RFID 시스템에서의 프라이버시 보호기술', 정보보호학회지 제14권 제6호, pp. 28-36, 2004
10 M.Feldhofer, S.Dominikus, J.Wolkerstorfer, 'Strong Authentication for RFID Systems Using the AES Algorithm', Springer, In Conference of Cryptographic Hardware and Embeded Systems 2004 Proceedings, pp.357-370, 2004
11 S.Haller, S.Hodges,, 'The Need for a Universal Smart Sensor Network', Auto-ID Center, White Paper, MIT, 2002
12 S.Sarma, D.W.Engels, 'On the Future of RFID Tags and Protocols', Technical Report, Auto-ID Center, MIT, 2003
13 M.Ohkubo, K.Suzuki, and S.Kinoshita, 'A Cryptographic Approach to 'Privacy-Frendly' Tag', RFID Privacy Workshop, 2003
14 D.Engels, 'The Use of the Electronic Product Code', Technical Report, Auto-ID Center, MIT, 2003
15 Auto-ID Center, '860-930MHz Class I Radio requency Identification Tag Radio Frequency & Logical ommunication Interface Specification Candidate ecommendation Version 1.0.1', Technical Report, uto-ID Center, MIT, 2002
16 S.A.Weis, S.Sarma, R.Rivest, and D.Engels, 'Security nd Privacy Aspect of Low-Cost Radio Frequency dentification Systems', Springer-Verlag, First nternational Conference on Security in Pervasive omputing, LNCS 2802, pp.201-212, 2004