Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.3.61

Lightweight RFID Authentication Protocols Based on Hash Function  

Ha, Jae-Cheol (Hoseo University)
Baek, Yi-Roo (Hoseo University)
Kim, Hwan-Koo (Hoseo University)
Park, Jea-Hoon (Kyungpook National University)
Moon, Sang-Jae (Kyungpook National University)
Abstract
To guarantee security between the tag and back-end server and implementation efficiency in low power tag, we propose two typed mutual authentication protocols in RFID system. One is static-ID authentication scheme which is well suitable in distributed server environments. The other is dynamic-ID scheme which is additively satisfied forward security. In proposed scheme, it does not need any random number generator in tag and requires only one(maximally three) hash operation(s) in tag or server to authenticate each other. Furthermore, we implement the proposed schemes in RFID smart card system and verify its normal operations.
Keywords
RFID Mutual Authentication Protocol; Static-ID Scheme; Dynamic-ID Scheme; Random Number Generator;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Ohkubo. K Suzuki. and S. Kinoshita. "Hash-Chain Based Forward Secure Privacy Protection Scheme for Low-Cost RFID." Tn proceedings of the SCrS'04, pp. 719-724. Sep. 2004
2 J.C. Ha, J.H. Ha. S.J. Moon. and C. Boyd. "LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System." ICUCT'06, LNCS 4412, pp. 80-89. 2006
3 하재철, 박제훈, 하정훈, 김환구, 문상재, "검색정보 사전 동기화를 이용한 저비용 RFID 인증 방식," 정보보호학회논문지, 18(1), pp. 77-88, 2008년 2월
4 S. Weis, S. Sarma, R. Rivest, and D. Engels. "Security and Privacy Aspects of Low Cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802. pp. 201-212. 2003
5 S. Lee, Y. Hwang. D. Lee, and J. Lim, "Efficient Authentication for Low-cost RFID Systems," ICCSA'05, LNCS 3480. pp. 619-627, 2005.
6 International Standard ISO/IEC 18000-6: Information technology- Radio frequency identification for item management-Part 6: Parameters for air interface communications at 860MHz to 960MHz, 2004
7 K. Rhee, J. Kwak. S. Kim, and D. Won, "Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment," SPC'05, LNCS 3450, pp. 70-84, 2005
8 D. Hemici and P. Muller. "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communication Security. Pp. 149-153. Mar. 2004
9 Auto-ID Center, "860MHz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and logical Communication Interface Specification Proposed Recommendation Ver. 1.0.0," Technical Report, MIT-AUTOID-TR-007 AutoID Center. MIT, pp. 1-19, Nov. 2002
10 T. Dimitriou, "A lightweight RFID protocol to protect against. traceability and cloning attacks," Security and Privacy for Emerging Areas in Communications Networks-2005, pp. 59-66, Sep. 2005
11 E. Choi. S. Lee. and D. Lee, "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment," EUC-2005, LNCS 3823, pp. 945-954, 2005