Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.1.195

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment  

Jang, Bong-Im (한남대학교 멀티미디어학과)
Jeong, Yoon-Su (충북대학교 전자계산학과 네트워크 보안연구실)
Kim, Yong-Tae (한남대학교 멀티미디어학부)
Park, Gil-Cheol (한남대학교 멀티미디어학부)
Abstract
RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.
Keywords
RFID System; Tag Authentication; Hash Function; Database;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 이병주, 송창우, 정경용, 임기욱, 이정현, "RFID 시스템에서 Hash-Chain 기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색", 한국콘텐츠학회논문지, Vol. 9, No. 9, pp.9-17, 2009.
2 Andrei Broder and Michael Mitzenmacher, "Network Applications of Bloom Filter: A Survey", Internet mathematics, Vol. 1, pp.485-509, 2004.   DOI
3 김진호, 서재우, 이필중, "저비용 RFID 시스템에 적합한 효율적인 인증 방법", 정보보호학회, 제18권, 제2호, pp.117-128, 2008.
4 원태연, 천지영, 박춘식, 이동훈, "수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계", 정보보호학회, 제18권, 제6(A)호, 2008.
5 Hung-Yu Chien, Chi-sung Laih, "ECC-based lightweight authentication protocol with untraceability for low-cost RFID", Journal of Parallel and Distributed Computing, Vol. 69, pp.848-853, 2009.   DOI   ScienceOn
6 안해순, 부기동, 윤은준, 남인길, "RFID/USN 환경을 위한 개선된 인증 프로토콜", 전자공학회 논문지, 제46권 CI편, 제1호, pp.1-10, 2009.
7 H. Chien, C. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards", Computer Standards & Interfaces, Vol. 29, pp.254-259, 2007.   DOI   ScienceOn
8 Alex X. Liu, LeRoy A. Bailey, "PAP: A Privacy and authentication protocol for passive RFID tags", Computer Communications, 32, pp.1194-1199, 2009.   DOI   ScienceOn
9 Hung-Yu Chien, Chen-Wei Huang, "A Lightweight Authentication Protocol for Low-Cost RFID", Journal of Signal Processing Systems, 59, pp.95-102, 2010.   DOI   ScienceOn
10 Woo-Sik Bae, Shin-Hyeong Choi, Kun Hee Han "RFID Security Authentication Protocol for the Ubiquitous Environment", Korea Society of Computer Information, Vol. 12, No. 4, pp.69-75, 2007.
11 S. E. Sarma, S. A. Weis and D. W. Engels, "RFID systems, security & privacy implications", Cryptographic Hardware and Embedded Systems- CHES 2002, LNCS 2523, pp.454-469, 2003.
12 Soo-Young Kang, Deok-Gyu Lee, Im-Yeong lee, "A study on secure RFID mutual authentication scheme in pervasive computing environment", Computer Communications, Vol. 31, pp.4248-4254, 2008.   DOI   ScienceOn
13 G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem", In Proceeding of the Financial Cryptography '05 - FC'05, LNCS 3570, pp.125-140, 2005.
14 S. Sarma, S. Weis and D. Engels, "Radio- Frequency identification: security Risks and Challenges", RSA Laboratories Cryptobytes, Vol.6, No.1, pp.2-9, 2003.
15 Yuichi Kobayashi, Toshiyuki Kuwana, Yojitanigughi and Norihisa Komoda "Group Management of RFID Passwords for Privacy Protection", Electronics and Communications in Japan, Vol. 92, No. 10, pp.24-31, 2009.   DOI   ScienceOn
16 Klaus Finkenzeller, RFID Handbook, Second Edition, John Wiley& Sons, 2003.
17 Stephen A. Weis, Sanjay E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Security in Pervasive Computing 2003, LNCS 2802, pp.201-212, 2004.