Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.6.57

Status-Based RFID Authentication Protocol  

Yoo Sung Ho (포항공과대학교)
Kim KiHyun (포항공과대학교)
Hwang Yong Ho (포항공과대학교)
Lee Pil Joong (포항공과대학교/KT)
Abstract
Recently, Radio Frequency Identification (RFID) systems stands in the spotlight of industry as a common and useful tool in manufacturing, supply chain management (SCM) and stock management. In the near future, low-cost RFID Electronic Product Code; (EPC) or smart-labels may be a practical replacement for optical barcodes on consumer items. However, manufacturing cheap and small RFID tags, and developing secure RFID authentication Protocols are problems which need to be solved. In spite of advances in semiconductor technology, computation and storage ability of the tag are so limited that it is difficult and too expensive to apply existing crypto-systems to RFID tags. Thus it is necessary to create a new protocol which would require less storage space and lower computation costs and that is secure in the RFID system's environments. In this paper, we propose a RFID authentication protocol that is secure against location tracking and spoofing attacks. Our protocol can be used as a practical solution for privacy protection because it requires less computations in database than the previous RFID authentication protocol.
Keywords
RFID; Authentication protocol; Location privacy;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sanjay E. Sarma. 'Towards the fivecent tag,' MIT Auto ID Center, Technical Report MIT-AUTOID-WH-006,2001. Available from http://www.autoidcenter.org
2 Dirk Henrici. and Paul Muller. 'Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers,' PerSec' 04, pp. 149-153, March 2004
3 Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. 'Cryptographic approach to 'privacyfriendly' tags,' RFID Privacy Workshop MIT, November 2003
4 Stephen Weis, Sanjay Sarma, Ronald Rivest, and Daniel Engels. 'Security and privacy aspects of low-cost radio frequency identification systems,' SPC'03, pp 454-469, March 2003
5 Sanjay Sarma, Stephen Weis, and Daniel Engels. 'RFID systems, security and privacy implications,' Technical Report MIT-AUTOID-WH014, AutoID Center, 2002. Available from http://www.autoidcenter. org
6 이근우, 오동규, 곽진, 김승주, 원동호. 'Low-Cost RFID 시스템을 위한 Improved Hash Chain 프로토콜,' CISC'S04, pp. 155-160. June 2004
7 Federal Information Processing Standards (FIPS). 'Advanced Encryption Standard (AES),' NIST, Technical Report 197, November 2001
8 윤호선, 류종호, 김락현, 윤이중, 염홍렬. '고속 동작 가능한 해쉬알고리즘 (HAVES)의 제안,' 한국정보보호학회논문지 8권 4호, pp.3-15, 1998
9 Stephen Weis. 'Security and Privacy in Radio-Frequency Identification Devices,' Masters Thesis MIT, May 2003
10 Alastair Beresford, and Frank Stajano. 'Location Privacy in Pervasive Computing,' IEEE Pervasive Computing 2003, pp. 46-55, 2003
11 Sanjay Sarma, Stephen Weis, and Daniel Engels. 'Radio-frequency identification systems.' CHES'02, LNCS 2523, pp. 454 - 469, August 2002
12 황영주, 이수미, 이동훈, 임종인. '유비쿼터스 환경의 Low-Cost RFID 인증프로토콜,' CISC'S04, pp. 120-122, June 2004
13 Ari Juels, Ronald Rivest, and Michael Szydlo. 'The blocker tag : Selective blocking of RFID tags for consumer privacy,' 8th ACM Conference on Computer and Communications Security. pp. 103 -111, 2003
14 Federal Information Processing Standards (FIPS). 'Secure Hash Standard (SHA-1),' NIST, Technical Report 180-1, April 1995
15 Federal Information Processing Standards (FIPS), 'Data Encryption Standard (DES),' NIST, Technical Report 46-2, January 1988