Browse > Article
http://dx.doi.org/10.6109/jkiice.2010.14.1.122

An Authentication Protocol Design in RFID System for Mobility  

Kim, Young-Jin (조선이공대학교 메카트로닉스과)
Abstract
RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.
Keywords
RFID; Tag; Reader; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S.A Weis, S.B. Sarma, R.L. Rivest, and D.W. Engels. "Sercurity and Privacy Aspects of Low-Cost Radio Frequency Identification System.", In Security in Pervasive Comp., Vol. 2802 of LNCS, pp. 201-212. 2004
2 박규진, 한경헌, 성종엽, 유도경, 최동유, 한승조. "RFID Tag의 인증을 통한 보안성 향상", 정보보호학회 하계학술대회, 2009. 06
3 G. Avoine, E. Dysli, and P. Oeschslin, "Reducing time Complexity in RFID systems", In The 12th Annual Workshop on Selected Areas in Cryptography. 2005
4 K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-reponse based RFID Authentication Protocol for Distributed Database Environment", In International Conferences on Security in Pervasive Computing. pp.70. 2005
5 M. Ohkuho, K. Suzki. and S. Kinoshita, "Cryptographic Approach to 'Privacy- Triendly' Tags", In RFID Privacy Workshop. 2003
6 H.Y. Chien, "Secure Access Control Schemes for RFID System with Anonymity", In Proceedings of 1005 national Workshop on Future Mobile and Ubiquitous Information Technologies. 2006
7 J. Yang, J. Park, and K. Kim "Security and Privacy on Authentication Protocol for Low-Cost Radio", In The 2005 Symposium on Cryptography and Information Security. 2005
8 김현. "Analysis of RFID Authentication Protocl", In KISA Report. 2006
9 S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. "Sercurity and Privacy Aspects of Low-Cost Radio Frequency Identification System.", In Security in Pervasive Comp., Vol. 2802 of LNCS, pp. 201-212. 2004
10 D. Molnar and D. Wanger, "Privacy and Security in Library RFID: Issues, Pratices, and Archtiectures." In Conference on Computer and Communication Security. pp.210. 2004
11 J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, "Mutual Authentication Protocol for Low-Cost RFID", Handout of the Ecrypt Workshop on RFID and Lightweight Crypto. 2005