Browse > Article

An Authentication Protocol using the key server in the EPCglobal RFID System  

Lee, Kyu-Hwan (아주대학교 전자공학과 무선 인터넷 연구실)
Kim, Jae-Hyun (아주대학교 전자공학과 무선 인터넷 연구실)
Abstract
This paper proposes an authentication protocol using the key server in the ECPglobai RFID system. The proposed authentication protocol uses the key server and the time-out mechanism to resist various attacks including DoS(Denial of Service) attack. For easy implementation, the proposed protocol also uses the function existing in EPCglobal class 1 gen2 protocol without additive function such as hash function. The proposed protocol is evaluated through two analytical methods. The correctness of the proposed protocol is proved using the GNY analysis. By the security analysis, this paper showed that the proposed protocol is resistant to various attacks including DoS attack. The analytical results demonstrated that the proposed protocol offered a secure RFID system.
Keywords
RFID; Security; Authentication; EPCglobal class 1 gen2;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Juels,'RFID Security and Privacy: A reserch Survey,' IEEE Journal on Selected Areas in Communications, VOL. 24, NO. 2, Feb. 2006
2 S. Weis, S. Sarma, R. Rivest and D. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,' in Proc. the First International Conference on Security in Pervasive Computing, 2003
3 D. N. Duc, J. Park, H. Lee, K. Kim, 'Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,' in Proc. the Symposium on Cryptography and Information Security, 2006
4 L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, 'Dynamic Key-Updating: Privacy- Pres erving Authentication for RFID Systems,' in Proc. Pervasive Computing and Communication, 2007
5 EPCglobal Inc., 'Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.09,' 2005
6 D. Hentici and P. Muller, 'Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers,' in Proc. the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004
7 T. Dimitriou, 'A Lightweight RFID Protocol to protect against Traceability and Cloning attacks,' in Proc. the First International Conference on Security and Privacy for Emerging Areas in Communiations Networks, 2006
8 RFID Journal, http://www.rfidjournal.com/
9 L. Gong, R. Needham, and R. Yahalom, 'Reasoning about Belief in Cryptographic Protocols,' in Proc. the IEEE Symposium on Research in Security and Privacy, 1990
10 C. Qingling, Z. Yiju, and W. Yonghua, 'A minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis,' in Proc. International Colloquium on Computing, Communication, Control, and Management, 2008