Browse > Article

Hash-based Mutual Authentication Protocol for RFID Environment  

Jeon, Dong-Ho (경북대학교 전자전기컴퓨터학부 컴퓨터통신망연구실)
Kim, Hae-Moon (경북대학교 전자전기컴퓨터학부 컴퓨터통신망연구실)
Kwon, Hye-Jin (경북대학교 전자전기컴퓨터학부 컴퓨터통신망연구실)
Kim, Soon-Ja (경북대학교 전자전기컴퓨터학부 컴퓨터통신망연구실)
Abstract
Recently, Ahn et al proposed an improved authentication protocol using the hash function in RFID environment. Their proposed protocol provide the following three merits; it reduces the computational costs of RFID tag. itrfduces the communication overhead between the reader and the tag. it protects the user privacy. However, this paper points out that does not authenticate the legality of the RFID reader and database. this paper proposes an improved mutual authentication protocol that can provide the mutual authenticaion.
Keywords
RFID; Mutual Authentication; Desynchronization Attack;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 M. Ohkubo, K. Suzuki and S. Kinoshita, "Efficient Hash-Chain Based RFID Privacy Protection Scheme", Privacy Workshop at the Sixth International Conference on Ubiquitous Computing (UbiComp 2004), 2004.
2 T. Li and G. Wang, "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols," Proc. 22nd IFIP TC-11 International Information Security Conference, May 2007.
3 K. Finkenzeller, RFID Handbook, John Wiley & Sons, 1999
4 P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Low-Cost RFID Tags", Proc. Second Workshop RFID Security, July, 2006.
5 S. Junichiro, H. Jae-Cheol, and S. Kouichi, "Enhancing privacy of universal re-encryption scheme for RFID tags," EUC 2004, LNCS 3207, pp.870-890, Springer-Verlag, 2004.
6 M. Ohkubo, K. Suzuki, and S. Kinoshita, "A Cryptographic Approach to "Privacy- Friendly" tag", RFID Privacy Workshop, 2003
7 A. Juels. "Minimalist cryptography for Low-Cost RFID Tags", The Fourth International Conferece on Security in Communication Networks- SCN 2004, LNCS 3352, pp.149-164, 2004.
8 안해순, 부기동, 윤은준, 남인길, "RFID/USN 환경을 위한 개선된 인증 프로토콜," 전자공학회논문지, 46(1), 제1호, pp.1-10. 2009.
9 P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "M2AP: A Minimalist mutual-Authentication Protocol for Low-Cost RFID Tags", Proc. Int' Conf Ubiquitous Intelligence and Computing(UIC, 06), pp.912-923, 2006.
10 A. Juels, "Strenthening EPC Tag against Cloning", ACM Workshop on Wireless Security (WiSe), pp.67-76, 2005.
11 D. Henrici,, P. Muller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", Proc. Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. PERCOMW '04, pp.149-153, 2004.
12 신진섭, 박영호, "RFID/USN 에서의 EXOR과 해쉬함수를 이용한 인증 프로토콜," 한국산업 정보학회논문지, 12(20), pp.24-29, 2007.
13 P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags", Proc. OTM Federated Conf and Workshop: IS Workshop, Nov. 2006.
14 S. Karthikeyan, and M. Nesterenko, "RFID security without extensive cryptography", Proc. 3rd ACM workshop on Security of ad hoc and sensor networks, pp.63-67, 2005.
15 H.-Y. Chien. "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, 4(4), pp.337-340. Oct-Dec, 2007.   DOI
16 권혜진, 이재욱, 전동호, 김순자, "데이터베이 스에서 태그 검색이 쉽고 안전한 RFID 상호 인증 프로토콜," 한국정보보호학회논문지, 18(5), pp. 125-134. 2008.
17 H-Y. Chien, and C-H. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards", Computers Standard & Interfaces, 29(2), pp.254-259, 2007.   DOI   ScienceOn
18 H.-Y. Chien and C.-W. Hung, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements," ACM Operating System Rev, 41(2), pp.83-86, July 2007.   DOI
19 A.Juels and S. A. Weis, "Authenticating pervasive devices with human protocols", Advances in Cryptogloy-Crypto '05, LNCS 3126, pp.293-308, springer, 2005.
20 D. N. Duc, J. park, H. Lee and K. Kim, "Enhancing Security of EPCgloabal Gen-2 RFID Tag against Traceability and Coning", The 2006 Symposium on Cryptography and Information Security, 2006.
21 T. Li and R.H. Deng, "Vulnerability Analysis of EMAP-an Effcinet RFID Mutual Authentication Protocol," Proc. Second International Conference, Availability, Reliability, and Security (AReS'07), 2007.
22 G. Avoine, P. Oechslin, "A Scalable and. Provably Secure Hash-based RFID Protocol", IEEE PerSec 2005, March 2005.
23 J. Munilla and A.Peinado, "HB-MP:A further step in the HB-family of lightweight authentication protocols", Computer Networks, 51(9): 2262-2267, June 2007.   DOI   ScienceOn
24 J. Bringer, H. chabanne, and E. Dottax, "HB++: A Lightweight Authentication Protocol Secure against Some Attacks", Proc. IEEE Int' Conf Pervasive Service, Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006.
25 JeaCheol Ha, JungHoon Ha, SangJae Moon, and Colin Boyd, "LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System", Ubiquitous Convergence Technology, 2007.
26 S.S Kumar and C. Paar, "Are standards compliant Elliptic Curve Cryptosystems Feasible on RFID?", Proceedings of Workshop on RFID security, Austria, July 2006.
27 S A Weis, S Sarma, R Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems", Security In Pervasive Computing 2003, LNCS 2802, pp.201-212, 2004.