Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.5.125

Easy to Search for Tags on Database and Secure Mutual Authentication Protocol for RFID system  

Kwon, Hye-Jin (Kyungpook National University)
Lee, Jae-Wook (Kyungpook National University)
Jeon, Dong-Ho (Kyungpook National University)
Kim, Soon-Ja (Kyungpook National University)
Abstract
A great number of RFID authentication protocols have been proposed for the secure RFID system. These are typically divided into three types according to primitive that they use : Hash-based, Re-encryption based, and XORing-based protocol. The well-known attacks in RFID system are eavesdropping. impersonating, location tracking, and so on. However, existing protocols could not provide security against above attacks, or it was not efficient to search for tags on database. Therefore, in this paper we present a protocol which is secure against above attacks by using hash function and makes Database search tags easily by attaining the state information of previous session through the shared values with all tags and database.
Keywords
RFID system; Authentication protocol; privacy;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 이용한, 김지영, 정지훈, "무선인식 (RFID) 개인 정보보호에 관한 국내외 동향 조사연구", 한국유통물류진흥원, 2006. 6
2 S A Weis, S Sarma, R Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems", Security In Pervasive Computing 2003, LNCS 2802, pp 201-212, 2004
3 M. Ohkubo, K. Suzuki and S. Kinoshita, "Efficient Hash-Chain Based RFID Privacy Protection Scheme", In Privacy Workshop at the Sixth International Conference on Ubiquitous Computing (UbiComp 2004), 2004
4 G. Avoine, P. Oechslin, "A Scalable and. Provably Secure Hash-based RFID Protocol", IEEE PerSec 2005, March 2005
5 P. Golle, M. Jakobsson, A. Juels, and P. Syverson, "Universal re-encryption for mixnets", Proc. of 2004 RSA Conference, 2004
6 K. Finkenzeller, RFID Handbook, John Wiley & Sons, 1999
7 A. Juels. "Minimalist cryptography for Low- Cost RFID Tags", In The Fourth International Conferece on Security in Communication Networks-SCN 2004, vol.3352 LNCS, pp. 149-164, 2004
8 M. Ohkubo, K. Suzuki, and S. Kinoshita, "A Cryptographic Approach to "Privacy- Friendly" tag", RFID Privacy Workshop, 2003
9 D. Henrici, P. Muller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. PERCOMW'04, pp. 149-153
10 JeaCheol Ha, SangJae Moon, Juan Manuel- Gonzalez Nieto, and Colin Boyd, "Security Analysis and Enhancement of One-Way Hash based Low-Cost Authentication Protocol (OHLCAP)", SSDU 2007, LNCS, 2007
11 유성호, 김기현, 황용호, 이필중, "상태기반 RFID 인증 프로토콜", 한국정보보호학회, pp. 57-68, 2004   과학기술학회마을
12 JeaCheol Ha, JungHoon Ha, SangJae Moon, and Colin Boyd, "LRMAP:Lightweight and Resynchronous Mutual Authentication Protocol for RFID System", Ubiquitous Convergence Technology, 2007
13 Junichiro Saito, Jae-Cheol Ryou, and Kouichi Sakurai, "Enhancing privacy of universal reencryption scheme for RFID tags", Embedded and Ubiquitous Computing EUC, pp. 879-890, 2004