Browse > Article
http://dx.doi.org/10.6109/jkiice.2015.19.2.357

Tag-Reader Mutual Authentication Protocol for secure RFID environments  

Lee, Young-Seok (Department of Information Communication Engineering, Kunsan National University)
Choi, Hoon (Department of Computer Science & Engineering, Chungnam National University)
Abstract
Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.
Keywords
RFID; Tag; Reader; Mutual Authentication; Protocol;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. Juels, "RFID Security and Privacy: AResearch Survey," IEEE Journal on Selected Areas in Communications, 24(2): 381-394, Feb.2006.   DOI
2 Li Lu, Yunhao Liu and Xiang-Yang Li,"Refresh: Weak Privacy Model for RFID Systems", IEEE INFOCOM 2010.
3 Taeyang Eom, Jeong-Hyun, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy", Korean Institute of Communication and Information Sciences, Vol. 36, No 6, 2011. 6.
4 M. Ohkubo, K. Suzuki, and S. Kinoshita,"Hash-chain based forward-secure privacy protection scheme for low-cost RFID,"Proceedings of the SCIS 2010, pp. 719-724, 2010.
5 J. Daemen, V. Rijmen, " The Design of Rijndeal," AESThe advanced Encryption Standard, Springer-Verlog, Berlin, Heidelberg, New York, 2009.
6 D. Henrici and P. Muuller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers,"Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communication Security, pp. 149-153, Mar. 2008.
7 Le, X.H., Lee, S. and Lee, Y.K. "Two-tier user authentication scheme for heterogeneous sensor network", Proceedings of the 5th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), USA, 2009.
8 Y. Chen, W. Trappe, and R. P. Martin, "Detecting and localizing wireless spoofing attacks," in SECON'07: Proceedings of the 4th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2007.
9 J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the Twelfth USENIX Security Symposium. Washington, DC, USA: USENIX Association, Aug. 2003, pp. 15-28.
10 Jin-seob Shin, Young-ho Park, "An Authentication Protocol using the EXOR and the Hash Function in RFID/USN," Korea Society of Industrial Information Systems, Vol. 12, No. 2, pp.24-29, 2007.6.
11 Hae-Soon Ahn, Ki-Dong Bu, "Improved Authentication Protocol for RFID/USN Environment", The Institute of Electronics and Information Engineers, Vol.46, No. CI-1, 2009.1.