Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.2.117

Efficient Authentication Protocol for Low-Cost RFID System  

Kim, Jin-Ho (POSTECH)
Seo, Jae-Woo (POSTECH)
Lee, Pil-Joong (POSTECH)
Abstract
Compared with the existing bar code system, RFID system has lots of advantages such as it identifies automatically massive objects. We might anticipate RFID technology will be a substitution for an optical bar code system in the near future. However, their feature that uses radio waves may cause various security problems. Many kinds of solutions have been researched to overcome these security problems. In this paper, we analyze the previous proposed protocols. And then, we categorize RFID authentication into two types according to the synchronization requirement between a Back-end Database and a Tag. In addition, we introduce the previous proposed approaches to tag search problem in RFID authentication. And we propose an efficient method which provides fast tag search by using membership test algorithm, a Bloom filter.
Keywords
RFID system; Hash Function; Authentication; Bloom Filter;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment," SPC 2005, LNCS 3450, pp. 70-84, 2005
2 Tassos Dimitriou, "A Second and Efficient RFID Protocol that could make Big Brother (partially) Obsolete," PERCOM06, IEEE, 2006
3 Christy Chatmon, Tri van Le and Mike Burmester, "Secure Anonymous RFID Authentication Protocols" Technical Report TR-060112, Florida State University, Department of Computer Science, 2006
4 Dirk Henrici and Paul Muller, "Hash-based Enhancement of Location Privacy for RadioFrequency Identification Devices using Varying Identifiers," PERCOMW'04, IEEE, 2004
5 하재철, 하정훈, 박제훈, 김환구, 문상재, "분산환경에 적합한 저비용 RFID 인증 프로토콜," 한국정보보호학회 하계 학술대회 2007, Vol. 17,pp. 78-83, 2007
6 N.W. Lo and Kuo-Hui Yeh, "Novel RFID Authentication Schemes for Security Enhancement and System Efficiency," SDM 2007, LNCS 4721, pp. 203-212, 2007
7 Andrei Broder and Michael Mitzenmacher, "Network Applications of Bloom Filters: A Survey," Internet mathematics, Vol. 1, pp. 485-509, 2004   DOI
8 JaeCheol Ha, JungHoon Ha, SangJae Moon, and Colin Boyd, "LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System," ICUCT 2006, LNCS 4412, pp. 80-89, 2007
9 Stephen A. Weis, Sanjay E. Sanna, Ronald L. Rivest, and Daniel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasice Computing 2003, LNCS 2802, pp. 201-212, 2004
10 Gene Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol," PERCOMW'06, IEEE, 2006
11 Jang-Su Park and Im-Yeong Lee, "RFID Authentication Protocol Using ID Synchronization in Insecure Communication," ICHIT'06, IEEE,2006
12 Pedro Peris-Lopez, Julio Cesar HemandezCastro, Juan M. Estevez-Tapiador, and Arturo Ribagora, "RFID Systems: A Survey on Security Threats and Proposed Solutions," PWC 2006, LNCS 4217, pp. 159-170, 2006
13 Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, and Jong In Lim, "Efficient Authentication for Low-Cost RFID Systems," ICCSA 2005, LNCS 3480, pp. 619-627, 2005
14 Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, "Cryptographic Approach to PrivacyFriendly Tags," RFID Privacy Workshop, Nov 2003
15 Song Han, Vidyasagar Potdar, and Elizabeth Chang, "Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Infonnation with Monitor," ICCSA 2007, LNCS 4707, pp. 227-238, 2007
16 Sangshin Lee, Tomoyuki Asano, Kwangjo Kim, "RFID Mutual Authentication Scheme based on Synchronized Sectet Infonnation," SCIS 2006, IEICE, 2006
17 하재철, 박제훈, 윤신숙, 김환구, 문상재, " 경량화된 RFID 상호 인증 프로토콜 제안," 한국정보보호학회 동계학술대회 2007, Vol. 17, No.2, pp. 331-336, 2007
18 Tassos Dimitriou, "A Lightweight RFID Protocol to protect against Traceability and Cloning attacks," SECURECOMM'05, IEEE, 2005
19 Stephen August Weis, "Security and Privacy in Radio-Frequency Identification Devices," Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY, May 2003