Browse > Article
http://dx.doi.org/10.6109/jkiice.2010.14.5.1171

Effective RFID Authentication Using Hash Function  

Shin, Hyo-Young (경복대학 인터넷정보과)
Jung, Gye-Dong (광운대학교 교양학부)
Abstract
Recently RFID system is used in various fields such as distribution industry, medical industry and military service. The technology for protecting individual privacy is necessary to adapt RFID system in several applications. This paper proposes an authentication protocol which conducts mutual authentication between back-end database and tag using hash function. The proposed protocol satisfies various RFID security requirements : mutual authentication, anonymity, confidentiality, integrity, replay attack, location trace. This protocol reduces the time for authentication minimizing the number of hash operation in back-end database.
Keywords
RFID; Authentication; Hash function; Security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 A. Juels, "Minimalist cryptography for low-cost RFID tags", In 4th International Conference on Security in Communication Networjs-SCN 2004, Vol. 3352, LNCS pp. 149-164.
2 S. Karthikeyan, M. Nesterenko, "RFID Security without extensive cryptography", Proc. of 3rd workshop on Security of AdHoc and Sensor Networks, 2005, pp. 63-67.
3 Ari Juels, Ravikanth Pappu, "Squealing Euros: Privacy Protection in RFID-Enabled Banknotes", LNCS 2742, pp.103-121, 2003.
4 S. Weis, "Radio-frequency identification security and privacy", Master's thesis, M.I.T. 2003.
5 R. Chandramouli, T. Grance, R. Kuhn, "Security Standards for the RFID Market", IEEE Security & Privacy, Nov./Dec. 2005.
6 S. Junichiro, H. Jae-Cheol and S. kouichi, "Enhancing privacy of universal re-encryption scheme for RFID tags", EUC 2004, vol. 3207, LNCS, pp. 879-890, Springer-Verlag, 2004.
7 김배현, 유인태, "반사공격에 안전한 RFID 인증 프로토콜', 한국통신학회논문지, 제 32권, 제 3호, pp.348-354, 2007, 3.   과학기술학회마을
8 안해순, 부기동, 윤은준, 남인길, "강력한 보안성을 제공하는 RFID 상호 인증 프로토콜", 정보처리학회논문지, 제 16-C권, 제3호, 2009, 6.   과학기술학회마을   DOI   ScienceOn
9 M. Ohkubo, K. Suzuki and S. Kinoshita, "Hash-Chain Based Forward Secure Privacy Protection Scheme for Low-Cost RFID", Proceedings of the SCIS '04, pp.719-724, Sep. 2004.
10 S. Weis, S. Sarma, R Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification System", Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2004.
11 S. L Garfinkel, A. Juels and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions", IEEE Security and Privacy, vol.3, pp.34-43, May/June 2005.
12 김익수, "효율성을 고려한 해시 함수 기반의 안전한 RFID 프로토콜", 한국통신학회논문지, 제34권, 제4호, pp.428-434, 2009.   과학기술학회마을