Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.6.25

Efficient RFID Authentication protocol for Distribution Database Environment  

Choi, Eun-Young (Graduate School of Information Management and Security, Korea University)
Lee, Su-Mi (Graduate School of Information Management and Security, Korea University)
Lim, Jong-In (Graduate School of Information Management and Security, Korea University)
Lee, Dong-Hoon (Graduate School of Information Management and Security, Korea University)
Abstract
Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the sniな and Privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to distribution database environment. Hence our scheme can be applied to ubiquitous computing environment.
Keywords
Low-cost RFID system; Privacy; Authentication protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Avoine and Ph. Oechslin, 'A Scalable and Provably Secure Hash-Based RFID Protocol', The 2nd IEEE International Workshop on Pervasive Computing and Communication Security – PerSec 2005, IEEE Computer Society Press, Kauai Island, Hawaii, USA, 3, 2005
2 EPCglobal, 'EPCTM Tag Data Standards Version 1.1 Rev.1.24 Standard Specification 01', 04, 2004
3 A. Juels, R. Rivest and M. Szydlo, 'The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy'. In the 8th ACM Conference on Computer and CommunIcations Security, pp. 103-111, ACM Press. 2003
4 S. A. Weis, S. E. Sarma, S. A. Weis and D. W. Engels, 'Security and privacy Aspects of Low-Cost Radio Frequency Identification Systems'. First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit. edu/sweis/spc-rfid.pdf
5 Sang-Soo Yeo and Sung Kwon Kim, 'Scalable and Flexible Privacy Protection Scheme for RFID Systems', ESAS 2005, LNCS 3813, pp. 153-163, 2005
6 Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim, 'Mutual authentication protocol for low-cost RFID, Ecrypt Workshop, Workshop on RFID and Lightweight Crypto, pp. 17-24, 2005
7 M. Ohkubo, K. Suzuki and S. Kinoshita, 'Efficient Hash-Chain Based RFID Privacy Protection Scheme', Ubcomp2004 workshop
8 Jeonil Kang and Daehun Nyang, 'RFID Authentication Protocol with Strong Resistance against Tracea bility and Denial of Service Attacks', ESAS 2005, LNCS 3813, pp. 164-175, 2005
9 Keunwoo Rhee, Jin Kwak, Seungjoo Kim and Dongho Won, 'Challenge- Response based secure RFID Authentication Protocol for Distributed Database Environment', SPC 2005, LNCS 3450, pp.70-84, Springer- Verlag, 4, 2005
10 Su Mi Lee, Young Ju Hwang, Dong Hoon Lee and Jong In Lim, 'Efficient Authentication for Low-Cost RFID systems', ICCSA 05, LNCS 3480, pp.619-629, 2005
11 S. E. Sarma, S. A. Weis and D. W. Engels, 'Radio-frequency identification systems'. CHES'02, LNCS 2523, pp.454-469, Springer-Verlag, 2002
12 D. Henrici and Paul Muller, 'Hashbased Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers', PerSec'04 at IEEE PerCom. pp. 149-153, 2004
13 A. Juels, 'Minimalist cryptography for Low-Cost RFID Tags', In The Fourth Internationl Conferecne on Security in Communication Networks- SCN 2004, LNCS 3352, pp. 149-164, Springer-Verlag. 2004
14 Istvan Vajda and Levente Buttyan, 'Lightweight authentication protocols for low-cost RFID tags', Workshop on Security in Ubiquitous Computing, 2003
15 S. E. Sarma, S. A. Weis and D. W. Engels, 'RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH- 014', AutoID Center, MIT, 2002
16 S. E. Sarma, 'Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center', 2001. Abailable from http://www. autoidcenter.org
17 유성호, 김기현, 황용호, 이필중, '상태 기반 RFID 인증 기법 프로토콜', 정보보호학회논문지, 제 4권, 6호, 12, 2004
18 Auto-ID Center, '860Mhz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and Logical communication Interface Specification Specification Proposed Recommendation Version 1.0.0. Technical Report MIT-AUTOID-TR-007', AutoID Center, MIT, 2002
19 S. Junichiro, R. Jae-Cheol and S. Kouichi, 'Enhancing privacy of Universal Re-encryption scheme for RFID Tags', EUC 2004, LNCS 3207, pp.879-890, Springer-Verlag, 12, 2004
20 A. Juels and R. Pappu, 'Squealing euros : Privacy protection in RFIDenabled banknotes', In proceedings of Financial Cryptography -FC'03, LNCS 2742, pp.103-121, Springer- Verlag, 2003