Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.4.71

RFID Authentication Protocol with Strong Resistance against Traceability and Denial of Service attack  

Kang, Jeon-Il (INHA University Graduate School of IT & T)
Nyang, Dae-Hun (INHA University Graduate School of IT & T)
Abstract
Though there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag's hardware limitation, these protocols suffer from many security threats, especially from DoS (Denial of Service) attack. In this paper, we explain location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we suggest an authentication protocol that is strong against location tracing, spoofing attack and DoS attack
Keywords
RFID system; Location Privacy; Authenticatuion protocol; Denial of Service attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Stephen J. Engberg, Morten B. Harning and Christian Damsgaard Jensen, 'Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience,' Privacy, Security and Trust 2004 - PST2004, EU Smarttag Workshop, 2004
2 Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, 'Cryptographic Approach to 'Privacy-Friendly' Tags,' NTT Laboratories, Japan, RFID Privacy Workshop MIT, 2003
3 Istvan Vajda and Levente Buttyan, 'Lightweight Authentication Protocols for Low-Cost RFID tags,' Budapest University of Technology and Economics, Hungary, 2003
4 Gildas Avoine and Philippe Oechslim, 'RFID Traceability: A Multilayer Problem,' Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland, Financial Cryptography – FC'05, LNCS, Springer, 2005
5 Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, 'Challenge- Response based RFID Authentication Protocol for Distributed Database Environment,' Proc. of SPC 2005, 2nd International Conference on Security in Pervasive Computing, Springer-Verlag GmbH, LNCS 3450, pp. 70-84, April 2005
6 Ari Juels, 'Minimalist Cryptography for Low-Cost RFID Tags,' RSA Laboratories, USA
7 Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson, 'Universal Re-encryption for Mixnets,'
8 Martin Feldhofer, 'A Propsal for an Authentication Protocol in a Security Layer for RFID Smart Tags,' Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria
9 Ari Juels, Ronal L. Rivest and Michael Szydlo, 'The Blocker Tag: Selective Blocking of RFID Tag for Consumer Privacy,' RSA Laboratories, USA
10 Ari Juels, 'Yoking-Proofs for RFID Tags,' RSA Laboratories, USA   DOI
11 Epstein, M., Hars, L., Krasinski, R., Rosner, M., Zheng, H.: Design and implementation of a true random number generator based on digital circuit artifacts. In Walter, C.D., Cetin K. Koc, Paar, C., eds.: CHES 2003. Volume 2779 of LNCS., Berlin, Springer-Verlag pp.152-165, 2003
12 유성호, 김기현, 황용호, 이필중, '상태기반 RFID 인증 프로토콜,' 포항공과대학교, 대한민국, 정보보호학회 논문지 제14권 6호, 2004년 12월
13 Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,' In First International Conference on Security in Pervasive Computing, 2003
14 Dirk Henrici and Paul Müller, 'Hash- based Enhancement of Location Privacy for Radio-Frequency Identification Device using Verying Identifiers,' University of Kaiserslautern, Germany, Workshop on Pervasive Computing and Communications Security - PerSec 2004, pp. 149-153, IEEE, 2004