Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.4.13

Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol  

Yeo Sang-Soo (Dankook University)
Kim Soon-Seok (Halla University)
Kim Sung-Kwon (Chung-Ang University)
Abstract
RFID technology is evaluated as one of core technologies for ubiquitous environment, because of its various characteristics which barcode systems don't have. However, RFID systems have consumer's privacy infringement problems, such like information leakage and location tracing. We need RFID privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect consumer's privacy perfectly. The most secure protocol, that satisfies all of the three essential security requirements, among existing protocols, is the hash-chain based protocol that Ohkubo proposed. Unfortunately this protocol has a big disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the original scheme of Ohkubo protocol.
Keywords
RFID; Privacy; Pre-computation; One-way hash function;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 이상원, 천정희, 김용대, 'Pairing을 이용한 트리기반 그룹키 합의 프로토콜', 정보보호학회논문지, 13권, 3호, pp. 101-110, 2003
2 D. Molnar and D. Wagner, 'Privacy and Security in Library RFID Issues, Practices, and Architectures', In Proceedings of the 11th ACM Conference on Computer and Communications Security (ACM CCS 2004), pp. 210-219, October 2004
3 K. Finkenzeller, RFID Handbook, John Wiley & Sons, 1999
4 Crypto++ Library, http://www.eskimo .com/-weidai/cryptlib.html
5 박영호, 이경현, '이동네트워크 환경에서 그룹키 관리구조', 정보보호학회논문지, 12권, 2호, pp. 89-77, 2002
6 M. Ohkubo, K. Suzuki and S. Kinoshita, 'Efficient Hash-Chain Based RFID Privacy Protection Scheme', In Privacy Workshop at the Sixth International Conference on Ubiquitous Computing (UbiComp 2004), September 2004
7 조태남, 이상호, '(2,4)-트리를 이용한 그룹키 관리', 정보보호학회논문지, 11권, 4호, pp. 77-64, 2001
8 S. Weis, S. Sarma, R. Rivest and D. Engels, 'Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems', In Proceedings of the 1st International Conference on Security in Pervasive Computing, vol. 2802 of LNCS, pp. 454-469, March 2003
9 D. Henrici and P. Müller, 'Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers', In Proceedings of the 1st IEEE International Workshop on Pervasive Computing and Communication Security, pp. 149-153, March 2004
10 M. Feldhofer, 'An Authentication Protocol in a Security Layer for RFID Smart Tags', In Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (MELECON 2004), pp.759-762, May 2004
11 박영희, 정병천, 이윤호, 김희열, 이재원, 윤현수, 'Diffie-Hallman 키 교환을 이용한 확장성을 가진 계층적 그룹키 설정 프로토콜', 정보보호학회논문지, 13권, 5호, pp. 3-15, 2003
12 S. Sarma, S. Weis and D. Engels, 'RFID Systems and Security and Privacy Implications', In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems 2002, vol. 2523 of LNCS, pp. 454-469, August 2002
13 S.-S. Yeo and S. K. Kim, 'Scalable and Flexible Privacy Protection Scheme for RFID System', In Proceedings of the 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2005), vol. 3813 of LNCS, pp. 153-163, July 2005
14 권정옥, 황정연, 김현정, 이동훈, 임종인, '일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜 : ELKH', 정보보호학회논문지, 12권, 6호, pp. 93-112, 2002
15 M. Ohkubo, K. Suzuki and S. Kinoshita, 'Cryptographic Approach to 'Privacy-Friendly' Tags', In RFID Privacy Workshop, MIT Media Laboratory, November 2003