Browse > Article

RFID Tag's Security Level Based RFID Authentication Protocol  

Oh Soo-hyun (호서대학교 컴퓨터공학부 정보보호)
kwak Jin (성균관대학교 정보통신공학부 정보통신보호연구실)
Abstract
Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.
Keywords
RFID; security level; hash function; authentication; privacy;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Juels and R. Pappu(2003), 'Squealing Euros : Privacy protection in RFID-enabled banknotes', Financial Cryptography'03, LNCS 2742, pp. 103-121, Springer-Verlag
2 A. Juels, R. L. Rivest and M. Szydlo(2003), 'The Blocker Tag : Selective Blocking of RFID Tags for Consumer Privacy', 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111
3 S. E. Sarma, S. A. Weis, and D. W. Engels (2002), 'Radio-frequency identification systems'. Workshop on Cryptographic Hardware and Embedded Systems, CHES'02, LNCS 2523, pp. 454-469, Springer-Verlag
4 오수현, 곽진, '유비쿼터스 환경에 적합한 사용자 프라이버시 보호 기능을 제공하는 RFID 시스템', 한국통신학회 논문지, vol. 29, No. 12C, pp. 1729-1738, 2004. 12
5 이근우, 오동규, 곽진, 김승주, 원동호 'Lowcost RFID 시스템을 위한 Improved Hash Chain', CISC, Vol.14 No.1, pp.628-632, 2004
6 이은곤, 'RFID확산 추진현황 및 전망', 정보통신정책 제 16권 6호, 2004.4
7 M Ohkubo, K. Suzuki, and S. Kinoshita (2003), 'A Cryptographic Approach to 'PrivacyFriendly' tag', RFID Privacy Workshop
8 양정규, 김광주 표철식, '저가의 RFID에 관 한 정보보호 기법 연구', 한국정보보보학회 하계정보보호학술대회 학술지 Vol.14 No.1, 2004
9 S. E. Sarma, S. A. Weis, and D. W. Engels (2003), 'Radio-frequency-identification security risks and challenges', CryptoBytes, 6(1)
10 D. Henrici, P. Muller, 'Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers', Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. PERCOMW '04, pp.149-153, IEEE, 2004
11 S. A. Weis(2003), 'Radio-frequency identification security and privacy', Master's thesis, M.l. T
12 K. Finkenzeller(1999), RFID Handbook, John Wiley and Sons
13 RFlD Standardization, http://www.rfidhandbook.de/rfid/standardization.html
14 최동희, 최은영, 이동훈, '유비쿼터스 환경에서의 RFID 프라이버시 보호', 한국정보보호학회 하계정보보호학술대회 학술지, Vol.14 No.1, 2004
15 S. A. Weis, S. Sarma, R. Rivest, and D. Engels(2004), 'Security and privacy aspects of low-cost radio frequency identification systems', In First International Conference on Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, Springer-Verlag