Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.5.81

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy  

Jeon, Dong-Ho (Kyungpook National University)
Kim, Young-Jae (Kyungpook National University)
Kwon, Hye-Jin (Kyungpook National University)
Jeong, Seon-Yeong (Kyungwoon University)
Kim, Soon-Ja (Kyungpook National University)
Abstract
Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.
Keywords
RFID system; Authentication protocol; privacy;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 S.A. Weis, S. Sarma, R. Rivest, and D. Engels, 'Security and privacy aspects of low-cost radio frequency identification systems,' Security In Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2004
2 A. Juels and S.A. Weis, 'Authenticating pervasive devices with human protocols,' in Advances in Cryptogloy-Crypto '05, LNCS 3126, pp. 293-308, 2005
3 A. Juels, 'minimalist cryptography for low-cost RFID tags,' In The Fourth International Conferece on Security in Communication Networks- SCN 2004, LNCS 3352, pp. 149-164, 2004
4 A. Juels, 'Strenthening EPC tag against coning,' in ACM Workshop on Wireless Security (WiSe), pp. 67-76, Nov. 2005
5 P.P. Lopez, J.C.H. Castro, J.M.E. Tapiador, and A. Ribagorda, 'M2AP: A minimalist mutual-Authentication Protocol for Low-Cost RFID Tags,' Proc. Int' Conf Ubiquitous Intelligence and Computing(UIC '06). pp. 912-923, Sep. 2006   DOI   ScienceOn
6 P.P. Lopez. J.C.H. Castro, J.M.E. Tapiador, and A. Ribagorda, 'EMAP: An efficient mutual authentication protocol for low-cost RFID tags,' Proc. OTM Federated Conf and Workshop: IS Workshop, pp. 352-361, Nov. 2006   DOI
7 H.Y. Chien, 'SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity,' IEEE Transactions on Dependable and Secure Computing. vol. 4, no. 4, pp. 337-340, Oct.-Dec. 2007   DOI   ScienceOn
8 T. Cao, E. Bertino, and H. Lei, 'Security analysis of the SASI protocol,' IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 1, pp. 73-77, Jan.-Mar. 2009
9 P.P. Lopez, J.C.H. Castro. J.M.E. Tapiador, and A. Ribagorda, 'LMAP: A real lightweight low-cost RFID tags,' Proc. Second Workshop RFID Security, pp. 137 -148, July 2006
10 곽민혜, 김광조, '취약성 분석을 통한 경량 RFID 인증 프로토콜 고찰,' 2008년도 한국정보보호학회 동계학술대회, pp. 201-208, 2008년 12월
11 T. Li and G. Wang, 'Security analysis of two ultra-lightweight RFID authentication protocols,' in Proc. 22nd IFIP TC-ll International Information Security Conference, pp. 109-120, May 2007.   DOI
12 하재철, 박제훈, 하정훈, 김환구, 문상재, '검색정보 사전 동기화를 이용한 저비용 RFID 인증방식,' 정보보호학회논문지, 18(1), pp. 80-89, 2008년 2월
13 T. Li and R.H. Deng, 'Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol.' in Proc. Second International Conference, Availability, Reliability, and Security (AReS'07), pp. 238-245, Apr. 2007   DOI
14 최은영, 이수미, 임종인, 이동훈, '분산시스템 환경에 적합한 효율적인 RFID 인증 시스템,' 정보보호학회논문지, 16(2), pp. 25-35, 2006년 12월
15 H.Y. Chien and C.H. Chen, 'Mutual authentication protocol for RFID conforming to EPe class 1 generation 2 standards,' in Computers Standard & Interfaces, vol. 29, no. 2, pp. 254-259, Feb. 2007   DOI   ScienceOn
16 유성호, 김기현, 황용호, 이필중, '상태기반 RFID 인증 프로토콜,' 정보보호학회논문지, 14(6), pp. 57-68. 2004년 12월
17 D. Henrici and P. Muller, 'Hash-based enhancement of location privacy for radio- frequency identification devices using varying identifiers,' Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. PERCOMW '04, pp. 149-153, Sep. 2004   DOI
18 J. Bringer, H. chabanne, and E. Dottax, 'HB++: A lightweight authentication protocol secure against some attacks,' in Proc. IEEE Int' Conf Pervasive Service, Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 28-33, June 2006
19 J.C. Ha, J.H. Ha, S.J. Moon, and C. Boyd, 'LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID System,' ICUCT'06, LNCS 4412, pp. 80-89, 2006
20 M. Ohkubo, K. Suzuki, and S. Kinoshita, 'A cryptographic approach to privacyfriendly tag,' RFID Privacy Workshop, MIT, Nov. 2003
21 K. Finkenzeller. RFID Handbook. John Wiley & Sons, p. 427, May 2003
22 H.Y. Chien and C.W. Hung, 'Security of ultra-lightweight RFID authentication protocols and its improvements,' ACM Operating System Rev., vol. 41, no. 2, pp. 83-86, July 2007   DOI
23 J. Munilla and A. Peinado, 'HB-MP: A further step in the HB-family of lightweight authentication protocols,' Computer Networks, vol. 51, no. 9, pp. 2262-2267, June 2007   DOI   ScienceOn
24 G. Avoine and P. Oechslin, 'A scalable and. provably secure hash-based RFID protocol,' IEEE PerSec 2005, pp. 110-114, Mar. 2005
25 S. Karthikeyan and M. Nesterenko, 'RFID security without extensive cryptography,' in Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 63-67, Nov. 2005   DOI