Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.7.1634

Mutual Authentication Protocol using One Time Password for Mobile RFID System  

Sung, Jong-Yeop (Department of Information and Communication Engineering, Chosun University)
Lee, Sang-Duck (Department of Information and Communication Engineering, Chosun University)
Ryu, Chang-Ju (Department of Information and Communication Engineering, Chosun University)
Han, Seung-Jo (Department of Information and Communication Engineering, Chosun University)
Abstract
Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.
Keywords
Mobile RFID; RFID; Mutual Authentication; Protocol;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 H. C. Yoon, J. K. Kim, J. Y. Park, J. U. Bum, "Passive RFID Sensor Tag," The Journal of Korean Institute of Electromagnetic Engineering and Science, Vol.16, no.3, pp. 16-25, 2005.
2 IETF RFC 1760, "The S/KEY One-Time Password System," Feb. 1995.
3 Deborah Platt Majoras, "Radio Frequency Identification : Applications and Implications for Consumers," Workshop Report from the staff of the Federal Trade Commission, Mar. 2005.
4 S. M. Lee, E. H. Kim, M. S. Jun, "Design of RFID Mutual Authentication Protocol for Mobile," Journal of the Institute of Communication and Information Sciences of Korea, Vol.33, no.2, pp183-190, Feb. 2010.
5 Hung-Yu Chien and Che-Hao Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards," Computer Standards & Interfaces, Vol 29 No 2, pp.254-259, Feb. 2007.   DOI   ScienceOn
6 H. Y. Chien, "Secure Access Control Schemes for RFID System with Anonymity," In Proceedings of 1005 national Workshop on Future Mobile and Ubiquitous Information Technologies. 2006.
7 Martin Feldhofer, Sandra Dominikus and Johannes Wolkerstorfer. "Strong authentication for RFID systems using the AES algorithm," Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, pp. 357-370, 2004.
8 D.N. Duc, J.M. Park, H.R. Lee and K.J. Kim, "Enhancing Security of EPCglobal GEN-2 RFID Tag against Traceability and Cloning," Symposium on Cryptography and Information Security, 2006.