Browse > Article

A Design of RFID Mutual Authentication System based on Open Channel  

Yoon, Eun-Jun (경북대학교 전자전기컴퓨터학부)
Yoo, Kee-Young (경북대학교 컴퓨터공학과 정보보호연구실)
Abstract
General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.
Keywords
RFID; Authentication; Ubiquitous Security; Protocol; One-Way Hash Function;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 S. E. Sarma, S. A. Weis, and D. W. Engels. 'RFID systems, security & privacy implications,' White Paper MIT-AUTOIDWH_014, MIT AUTO-ID CENTER, 2002
2 A. Juels, R. L. Rivest, M Szydlo 'The blocker tag: selective blocking of RFID tags for consumer privacy,' In Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111, 2003
3 S. Junichiro, H. Jae-Cheol and S. Kouichi, 'Enhancing privacy of universal re-encryption scheme for RFID tags,' EUC 2004, Vol. LNCS 3207, pp. 879-890, Springer-Verlag, 2004
4 양형규, 안영화, '유비쿼터스 컴퓨팅 환경에 적합한 RFID 인증 프로토콜에 관한 연구', 전자공학회논문지 42권 CI 1호, pp. 45-50, 2005
5 최은영, 최동희, 임종인, 이동훈, '저가형 RFID 시스템을 위한 효율적인 인증 프로토콜', 정보보호학회논문지 15권 5호, pp. 59-71, 2005
6 안해순, 부기동, 윤은준, 남인길, 'RFID/USN 환경을 위한 개선된 인증 프로토콜', 전자공학회논문지, 제46권, 제CI-1호, pp. 1-10, 2009
7 B. Schneier, 'Applied cryptography protocols,' Algorithms and Source Code in C, 2nd edn. John Wiley, Chichester, 1995
8 박인정, 현택영, 'RFID를 이용한 작업관리 시스템', 전자공학회논문지, 제44권, 제CI-2호, pp. 31-36, 2007
9 김배현, 유인태, '반사공격에 안전한 RFID 인증 프로토콜', 한국통신학회논문지 32권 3호, pp. 348-354, 2007
10 F. Klaus, 'RFID handbook,' Second Edition, Jone Willey & Sons, 2003
11 K. Rhee, J. Kwak, S. Kim, and D. Won, 'Challenge-response based RFID authentication protocol for distributed database environment,' Proc. of the SPC 2005, Vol. LNCS 3450, pp. 70-84, Springer-Verlag, 2005
12 S. A. Weis, 'Radio-frequency identification security and privacy,'Master's Thesis, M.I.T. 2003
13 A. Juels and S. Weis, 'Defining strong privacy for RFID,' Cryptology ePrint Archive, Report 2006/137, 2006
14 오선문, 강대성, 'NMF와 LDA 혼합 특징추출을 이용한 해마 학습기반 RFID 생체 인증 시스템에관한 연구', 전자공학회논문지, 제43권, 제SP-4호, pp. 46-54, 2006
15 A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, 'Handbook of applied cryptography,' CRC Press, New York, 1997
16 P. I. Paise and S. Vaudenay, 'Mutual Authentication in RFID: Security and Privacy,' Proc. of the CCS 2008, pp. 292-299, ACM, 2008
17 A. Juels and R. Pappu, 'Squealing euros: privacy protection in RFID-enabled banknotes,' In proceedings of Financial Cryptography-FC'03, Vol. 2742 LNCS, pp. 103-121, Springer-Verlag, 2003
18 S. Vaudenay, 'On privacy models for RFID,' Proc. of the Asiacrypt 2007, Vol. 4833, pp. 68-87, Springer-Verlag, 2007   DOI
19 M. Ohkubo, K. Suzuki, and S. Kinoshita, 'Hash-chain based forward-secure privacy protection scheme for low-cost RFID,' Proceedings of the SCIS 2004, pp. 719-724, 2004
20 김진목, 유황빈, '유비쿼터스 환경에서 Pre-Distribution을 기반으로 한 안전한 RFID 시스템', 전자공학회논문지, 제42권, 제CI-6호, pp. 29-36, 2005
21 I. Damgard and M. O. Pedersen, 'RFID security: tradeoffs between security and efficiency,' Proc. of the CT-RSA 2008, Vol. LNCS 4964, pp. 318-332, Springer-Verlag, 2008
22 S. A. Weis, S. Sarma, R. Rivest, D. Engels, 'Security and privacy aspects of low-cost radio frequency identification systems,' Security in Pervasive Computing 2003, Vol. LNCS 2802, pp. 201-212, Springer-Verlag, 2004