Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.1.77

Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System  

Ha, Jae-Cheol (Hoseo University)
Park, Jea-Hoon (Kyungpook National University)
Ha, Jung-Hoon (Kyungpook National University)
Kim, Hwan-Koo (Hoseo University)
Moon, Sang-Jae (Kyungpook National University)
Abstract
Recently, many hash-based authentication protocols were presented to guarantee mutual authentication between tag and DB in RFID system. To be suitable for distributed DB environment, one generally uses fixed constant value as a tag ID. However, some existing protocols have security flaws or heavy computational loads in DB in order to search a tag ID. We propose a secure authentication protocol which is suitable for distributed DB environment by using unchangeable tag ID. The storage method of pre-synchronized information in DB at previous session is core idea of our proposal which gives low-cost ID search of DB at next session. In normal synchronization state, our protocol only requires 3 hash operations in tag and DB respectively.
Keywords
RFID System; Authentication protocol; Indistinguishability; Traceability;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Auto-ID Center, "860MHz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and logical Communication Interface Specification Proposed Recommendation Ver. 1.0.0, Technical Report, MITAUTOID- TR- 007", AutoID Center, MIT, 2002
2 International Standard ISO/IEC 18000-6: Information technology- Radio frequency identification for item management-Part 6: Parameters for air interface communications at 860MHz to 960MHz, 2004
3 D. Henrici, and P. Muller, "Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers", Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communication Security, pp. 149- 153, 2004
4 M. Ohkubo, K. Suzuki and S. Kinoshita, "Hash -Chain Based Forward Secure Privacy Protection Scheme for Low-Cost RFID", In proceedings of the SCIS'04, pp. 719-724, 2004
5 J. C. Ha, J. H. Ha, S. Moon and C. Boyd, LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System, ICUCT 2006, LNCS 4412, Dec., 2006
6 A, Jules and S. A. Weis, "Defining Strong Privacy for RFID", Cryptology ePrint Archive, Report 2006/137, Referenced 2006 at http://eprint.iacr.org, 2006
7 E. Choi, S. Lee, and D. Lee. "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment", EUC-2005, LNCS 3823, pp. 945-954, Springer-Verlag, 2005
8 S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2004
9 D. Kwon, D. Han, J. Lee, and Y. Yeom, "Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq2005", EUC- 2006, LNCS 4097, pp. 262-270, 2006
10 K. Rhee, J. Kwak, S. Kim and D. Won, "Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment", SPC'05, LNCS 3450, pp. 70-84, Springer-Verlag, 2005
11 S. Lee, Y. Hwang, D. Lee and J. Lim, "Efficient Authentication for Low-cost RFID Systems", ICCSA'05, LNCS 3480, pp. 619- 627, Springer-Verlag, 2005
12 J. Saito, J. Ryou, and K. Sakurai, "Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags", EUC-2004, LNCS 3207, pp. 879-890, Springer-Verlag, 2004
13 최은영, 이수미, 임종인, 이동훈, "분산시스템 환경에 적합한 효율적인 RFID 인증시스템", 한국정보보호학회논문지, 제 16권, 제 6호, pp. 25-35, 2006. 12   과학기술학회마을
14 권대성, 이주영, 구본욱, "경량 RFID 상호인증 프로토콜 LMAP, M2AP, EMAP에 대한 향상된 취약성 분석", 한국정보보호학회논문지, 제 17권, 제 4호, pp. 103-113, 2007. 8   과학기술학회마을
15 P. Peris-Lopez, J. Hermandez-Castro, J. Estevez-Tapaidor, and A. Ribagorda, "EMAP: An efficient Mutual-Authentication Protocol for Low-cost RFID tags", Proceedings of OTM Federated Conferences and Workshop: IS Workshop, Nov., 2006