Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.5.99

A Strong RFID Authentication Protocol Based on Synchronized Secret Information  

Ha, Jae-Cheol (Hoseo University)
Ha, Jung-Hoon (Kyungpook National University)
Park, Jea-Hoon (Kyungpook National University)
Moon, Sang-Jae (Kyungpook National University)
Kim, Hwan-Koo (Hoseo University)
Abstract
Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.
Keywords
RPID System; Authentication protocol; Indistinguishability; Backward untraceability; Forward unraceability;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Auto-ID Center, '860MHz-960MHz Class | Radio Frequency Identification Tag Radio Frequency and logical Communication Interface Specification Proposed Recommendation Ver. 1.0.0, Technical Report, MIT-AUTOID-TR-007', AutoID Center, MIT, 2002
2 M. Ohkubo, K. Suzuki and S. Kinoshita, 'Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID,' In proceedings of the SCIS'04, pp. 719-724, 2004
3 T. Dimitriou, 'A lightweight RFID protocol to protect against traceability and cloning attacks.' Security and Privacy for Emerging Areas in Communications Networks-2005, pp. 59-66, Sept., 2005
4 하재철, 하정훈, 박제훈, 김환구, 문상재, '분산 환경에 적합한 저비용 RFID 인증 프로토콜', 한국정보보호학회하계학술대회 논문집, 제 17권 제1호, pp.78-83, 2007. 6
5 S. Lee, Y. Hwang, D. Lee and J. Lim, 'Efficient Authentication for Low-cost RFID Systems', ICCSA'05, LNCS 3480, pp. 619-627, Springer-Verlag, 2005
6 J. C. Ha, J. H. Ha, S. J. Moon and C. Boyd, LRMAP: Lightweight and Re- synchronous Mutual Authentication Protocol for RFID System, ICUCT 2006, LNCS 4412, Dec., 2006
7 J. Saito, J. Ryou and K. Sakurai, 'Enhancing Privacy of Universal Reencryption Scheme for RFID Tags,' EU- 2004, LNCS 3207, pp. 879-890, Springer- Verlag, 2004
8 S. Lee, T. Asano and K. Kim. 'RFID Mutual Authentication Scheme based on Synchronized Secret Information.' Proceedings of the SCIS'06, 2006. available at http://caislab.icu.ac.kr/Paper/paper_files/2006/SCIS_Lee.pdf
9 C. H. Lim and T. K. Kwon, 'Strong and Robust RFID Authentication Enabling perfect Ownership Transfer,' ICICS'06, LNCS 4307, pp. 1-20, Springer-Verlag, 2006
10 박정수, 최은영, 이수미, 이동훈, '저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재 암호화 프로토콜', 한국정보보호학회논문지, 제 16권, 제 4호, pp. 3-12, 2006. 8   과학기술학회마을
11 최은영, 이수미, 임종인, 이동훈, '분산시스템 환경에 적합한 효율적인 RFID 인증시스템', 한국정보보호학회논문지, 제 16권, 제 6호, pp. 25-35, 2006. 12   과학기술학회마을
12 K. Rhee, J. Kwak, S. Kim and D. Won, 'Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment', SPC'05, LNCS 3450, pp. 70-84, Springer-Verlag, 2005
13 P. Peris-Lopez, J. C. Hermandez-Castro, J. M. Estevez-Tapaidor, A. Ribagorda, 'EMAP: An efficient Mutual-Authentication Protocol for Low-cost RFID tags,' Proceedings of OTM Federated Conferences and Workshop: IS Workshop, Nov., 2006