Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.2.249

An analysis of effectiveness and safety about matrix-based RFID authentication protocol  

Shin, Hyo-Young (Dept. of IT Security, Kyungbok University)
Hwang, Chi-Gon (Dept. of Computer Science, Kwangwoon University)
Jung, Kye-Dong (Div. of General Education Information Engineering, Kwangwoon University)
Publication Information
Journal of Digital Convergence / v.12, no.2, 2014 , pp. 249-255 More about this Journal
Abstract
RFID system is used in several fields such as traffic and access control. The study about RFID security is actively progressed as security threat has been increased. This paper suggests matrix-based authentication protocol. And we analyze the safety of authentication protocol and compares the effectiveness of the protocol with other authentication protocols. The suggested authentication protocol secures from wiretapping attack, replay attack, and spoofing attack, and reduces overload of back-end database so that has efficient performance.
Keywords
RFID; Authentication; Matrix; Information Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 H. Gillbert, M. Robshaw, H. Sibent, "Active attack against HB+: a probably secure lightweight authentication protocol", Electronics Letters, 13th October, vol. 41, No. 25, 2005.
2 A. Jules, R. L. Rivest, and M. Szydlo " Selective Blocking of RFID Tags for Consumer Privacy", In Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp.103-111, 2003
3 S. L. Garfinkel, A. Jules and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions", IEEE Security and Privacy, vol. 3, pp.34-43, May/June 2005.
4 Hyoyoung Shin, Kyedong Jung, Chigon Hwang, "A Study on the effectiveness of matrix-based authentication protocol", The 3rd International conference of convergence technology 2013, July 3-6, 2013.
5 R. Chandramouli, T. Grance, R. Kuhn, "Security Standards for the RFID Market ", IEEE Security & Privacy, Dec. 2005.
6 Christian Flockermeier, Sanjay Samara, "An Overview of RFID System Interfaces and Reader Protocols", 2008 IEEE International Conference on RFID, pp.232-pp.240, April, 2008
7 Su Youn Lee, Hyo Beom Ahn, "A Study on Secure Matrix-based RFID Authentication Protocol", Journal of information and security. Vol. 6, No.1, pp.83-90, 2006.
8 Eun-Jun Yoon, Kyeoung-Ju Ha, Kee-Young Yoo, "Robust Matrix-based RFID Mutual Authentication Protocol", The Journal Of Korea Information And Communications Society, Vol. 33, No. 11, 2008.
9 Ik-Su Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System", The Journal Of Korea Information And Communications Society, Vol. 34, No. 4, pp.428-434, 2009.   과학기술학회마을
10 Eun Young Choi, Dong Hee Choi, Jong In Lim, Dong Hoon Lee, "Efficient authenticate protocol for very Low-Cost RFID", Journal of the Korea Institute of Information Security and Cryptology, Vol. 15, No. 5, 2005.