Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37C.3.241

Improved An RFID Mutual Authentication Protocol Based on Hash Function  

Shin, Ju-Seok (한국전자통신연구원 자동차IT플랫폼 연구팀)
Oh, Se-Jin (경북대학교 전자전기컴퓨터학부 임베디드 시스템 연구실)
Jeong, Cheol-Ho (경남대학교 전자공학과)
Chung, Kyung-Ho (경운대학교 컴퓨터공학과)
Ahn, Kwang-Seon (경북대학교 전자전기컴퓨터학부 임베디드 시스템 연구실)
Abstract
In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.
Keywords
RFID; Authentication; Protocol; Hash Function; Security;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 D.W.Hong, K.Y.Chang, T.J.Park, K.I.Chung, "Trend of Cryptography for Ubiquitous Environment," Electronics and Telecommunications Trends, 20(1), pp. 63-72, Feb, 2005.
2 Korea Information Security Agency, "RFID Privacy GuideLine", Sep, 2007.
3 Tae Youn Won, Il Jung Kim, Eun Young Choi, Dong Hoon Lee, "Encryption scheme suitable to RFID Systems based on EPC Generation," Journal of the Korea Institute of Information Security and Cryptology, 18(1), pp. 67-75, Feb, 2008.
4 Jung-Sik Cho, Sang-Soo Yeo, Sung-Kwon Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value", Computer Communications, Vol. 34, No. 3, pp.391-397, Mar. 2011.   DOI   ScienceOn
5 A. Juels, "RFID security and privacy: a research survey", IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp.381-394, Feb. 2006.   DOI   ScienceOn
6 Hae-Soon Ahn , Ki-Dong Bu , Eun-Jun Yoon , In-Gil Nam, "Improved Authentication Protocol for RFID/USN Environment," Journal of the Institute of Electronics Enginners of Korea, 46(1), pp.1-10. 2009.   과학기술학회마을
7 Kim-Dae Jung, Jun Moon Seog, "Design of RFID Mutual Authentication Protocol using One Time Random Number", Journal of the Korea Information Science Society, 35(3), pp.243-250, Jun, 2008.   과학기술학회마을
8 JangYoung Chung, YoungSik Hong, "RFID Authentication Protocol Verification in Serverless Environment", Journal of the Korea Information Science Society, 35(1A), pp.140-145, Jun, 2008.   과학기술학회마을
9 JaeCheol Ha , JeaHoon Park , JungHoon Ha, HwanKoo Kim, SangJae Moon, "Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System", Journal of the Korea Institute of Information Security and Cryptology, 18(1), pp.77-87, Feb. 2008.   과학기술학회마을
10 S. A. Weis, "Security an Privacy in Radio-Frequency Identification Devices," MS Thesis. MIT. May, 2003.
11 S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W.Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2003.
12 S. E. Sarma, S. A. Weis, D. W. Engels. "RFID systems, security & privacy implications," White Paper MIT-AUTOID-WH_014, MIT AUTO-ID CENTER, 2002.
13 A. Juels and R. Pappu, "Squealing euros: privacy protection in RFID-enabled banknotes," In proceedings of Financial Cryptography-FC'03, Vol. 2742 LNCS, pp. 103-121, Springer-Verlag, 2003.
14 F. Klaus, "RFID handbook," Second Edition, Jone Willey & Sons, 2003.
15 Dong-ho Jeon, Hae-moon Kim, Hye-jin Kwon, Soon-ja Kim, "Hash-based Mutual Authentication Protocol for RFID Environment", Journal of the Korea Information and Communications Society, 35(1), pp. 42-52, Jan, 2010.   과학기술학회마을
16 Gene Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol", Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops, pp. 640-643, Mar. 2006.
17 J. Aragones, A. Martinez-Balleste, and A. Solanas, "A brief survey on rfid privacy and security", In World Congress on Engineering, 2007.
18 Chia-Hui Wei, Min-Shiang Hwang, Chin, A.Y, "A Mutual Authentication Protocol for RFID". Computing & Processing, vol.13, pp. 20-24. IEEE Computer Society (2011)
19 M. Ohkubo, K. Suzuki and S. Kinoshita, "Hash-chain based forward secure privacy protection sheme for low-cost RFID", Proceedings of the 2004 Symposium on Cryptography and formation Security.Sendai, pp. 719-724, 2004.