Browse > Article
http://dx.doi.org/10.6109/jkiice.2010.14.3.737

Authentication Protocol of Private Code-based for Advanced Security of RFID System  

Jang, Bong-Im (한남대학교 멀티미디어학과)
Kim, Yong-Tae (한남대학교 멀티미디어학과)
Jeong, Yoon-Su (충북대학교 전자계산학과 네트워크 보안연구실)
Park, Gil-Cheol (한남대학교 멀티미디어학과)
Abstract
The use of RFID recently tends to increase and is expected to expand all over the industry and life. However, RFID is much vulnerable to the malign threats such as eavesdropping, replay attack, spoofing attack, location tracking in the process of authentication. In particular, it is difficult to apply authentication protocol used in the other previous system to low-priced RFID tag. After all, this paper suggests the scheme of efficient authentication protocol for RFID privacy protection. Compared to the previous scheme, suggested scheme reinforces the checking process of transmission data and is secure from eavesdropping and spoofing attack. It minimizes the operation work of the tag and is very useful to apply to the low-priced tag. It also has the merit to confirm the efficiency of communication by reducing the communication rounds.
Keywords
RFID System; Authentication Protocol; Hash Function; Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 김대중, 전문석, "일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계", 정보과학회논문지:정보통신 제35권 제3호, pp.246-247, 2008.   과학기술학회마을
2 Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador and Arturo Ribagora, "RFID Systems: A Survey on Security Threats and Proposed Solutions", PWC 2006, LNCS 4217, pp.159-170, 2006.
3 Erol Ozan and Gaetan Hains, "Development of a Framework for the Enterprise RFID Defense System Architecture", Technical Report TR- LACL-2009-1, Laboratory of Algoritlunics, Complexity and Logic(LACL) University Paris 12(Paris Est), pp.1-14, 2009.
4 Klaus Finkenzeller, RFID Handbook, Second Edition, John Wiley& Sons, 2003.
5 A. Mitrokotsa, M. R. Rieback, and A. S. Tanenbaum, "Classification of RFID Attacks", Proc. Int'l Workshop on RFID Technology, pp.73-86, 2008.
6 정재영, 여준호, 이형섭, 표철식, "센서 태그 기술 동향", 전자통신동향분석 제22권 제3호, pp.38-45, 2007.
7 S. E. Sarma, S. A. Weis and D. W. Engels, "RFID systems, security & privacy implications", Cryptographic Hardware and Embedded Systems-CHES 2002, LNCS 2523, pp.454-469, 2003.
8 S. Sarma, S. Weis and D. Engels, "Radio-Frequency identification: security Risks and Challenges", RSA Laboratories Cryptobytes, Vol.6, No.1, pp.2-9, 2003 .
9 A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communications, Vol. 24, Issue: 2, pp.381-394, 2006.   DOI   ScienceOn
10 Stephen A. Weis, Sanjay E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Security in Pervasive Computing 2003, LNCS 2802, pp.201-212, 2004.
11 G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem", In Proceeding of the Financial Cryptography '05 - FC'05, LNCS 3570, pp.125-140, 2005.