Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37C.2.132

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code  

Oh, Se-Jin (경북대학교 전자전기컴퓨터학부 임베디드 시스템 연구실)
Yun, Tae-Jin (경운대학교 모바일공학과)
Lee, Chang-Hee (계명문화대학 컴퓨터학부)
Lee, Jae-Kang (경북대학교 전자전기컴퓨터학부 임베디드 시스템 연구실)
Chung, Kyung-Ho (경운대학교 컴퓨터공학과)
Ahn, Kwang-Seon (경북대학교 전자전기컴퓨터학부 임베디드 시스템 연구실)
Abstract
In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.
Keywords
RFID; Authentication; Protocol; Hash; CRC;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, Feb. 2006.   DOI   ScienceOn
2 S. Weis, S. Sarma, R. Rivest, D. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: International Conference on Security in Pervasive Computing, pp. 201-212, Mar. 2003.
3 S. A. Sarma, S. E. Weis, D. W. Engels, "RFID systems and security and privacy implications", cryptographic hardware and embedded systems - CHES 2002, LNCS, Vol. 2523, pp. 454-469, Aug. 2002.
4 배우식, 이종연, 김상춘, "해시함수 기반의 새로운 저비용 RFID 상호인증 프로토콜", 컴퓨터교육학회논문지, 제14권, 제1호, pp. 175-185, 2011. 01.
5 J. Cho, S. Yeo, S. Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value", Computer Communications, Vol. 34, No. 3, pp. 391-397, Mar. 2011.   DOI   ScienceOn
6 F. Klaus, RFID handbook Second Edition, Jone Willey & Sons, 2003.
7 J. Aragones, A. Martinez-Balleste, and A. Solanas. "A brief survey on rfid privacy and security", In World Congress on Engineering, 2007.
8 홍도원, 장구영, 박태준, 정교일, "유비쿼터스 환경을 위한 암호 기술 동향," 전자통신동향분석, 제20권, 제1호, pp. 63-72, 2005. 02.   과학기술학회마을