Browse > Article

Design of an RFID Authentication Protocol Using Token Key and Hash Function  

Na, Young-Nam (Dept. of Information Communications, Chosun University College of Science & Technology)
Han, Jae-Kyun (Korea National Open University)
Publication Information
전자공학회논문지 IE / v.48, no.2, 2011 , pp. 52-60 More about this Journal
Abstract
RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.
Keywords
RFID; Hash; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Yuksel, "Universal Hashing for Ultra-Low- Power Cryptograaphic Hardware Applications", Master's Thesis, Dept, of Electroniacal Engineering, WPI, 2004.
2 CRYPTOREC reports, published 2002 in Japen
3 David J. Wheeler and Robert M. Needham. TEA, a Tiny Encryption Algorithm. Technical report. Computer Laboratory. University of Cambridge. 1995.
4 NTRU. GenuID. http://www.ntru.com/products,com
5 주학수, "RFID 시스템의 보안 및 프라이버시 보호를 위한 기술 분석", 전자정보센터 IT리포트
6 ISO 18185-4, "Freight containers - Identification and Communication, Electronic seals - part 4: Data Protection", ISO Working Draft, 2004.
7 강전일, 박주성, 양대헌, "RFID 시스템에서의 프라이버시 보호 기술.", 한국정보보호학회 학회지 제14권 6호, pp.28-36, 2004.
8 Ari Juels and Ravikanth Pappu, "Squealing Euros; Privacy Protection in RFID Enalbed Banknotes", Financial Cryptography 2003 Springer Verlag 2003.
9 Juels, A et al. "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy", 10th ACM Conference on Computer and Communication Security, 2003.
10 S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. "Sercurity and Privacy Aspects of Low-Cost Radio Frequency Identification System.", In Security in Pervasive Comp., Vol. 2802 of LNCS, pp. 201-212. 2004.
11 박규진, 한경헌, 성종엽, 유도경, 최동유, 한승조. "RFID Tag의 인증을 통한 보안성 향상", 정보보호학회 하계학술대회, 2009.
12 H.Y. Chien, "Secure Access Control Schemes for RFID System with Anonymity", In Proceedings of 1005 national Workshop on Future Mobile and Ubiquitous Information Technologies. 2006.
13 J. Yang, J. Park, and K. Kim "Security and Privacy on Authentication Protocol for Low-Cost Radio", In The 2005 Symposium on Cryptography and Information Security. 2005.
14 Miyako Ohkudo. Koutatou Suzuki and Shingo Kinoshita, "Cryptographic Approach to Privacy-Friendly Tags.", Submitted 2003.
15 나종민, "트리-워킹 방식 기반의 RFID 시스템 스푸핑 방어 알고리즘.", 광운대학교 대학원 컴퓨터 과학과, 2007.