Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.1.85

Improved Authentication and Data Protection Protocol of Passive RFID Security Tag and Reader  

Yang, Yeon-Hyun (Department of Electronic and Electrical Engineering, POSTECH)
Kim, Sun-Young (Graduate School of Information Technology, POSTECH)
Lee, Pil-Joong (Department of Electronic and Electrical Engineering, POSTECH)
Abstract
As an automatic identification technology, in which electronic tags are attached to items and system auto-identifies informations of the items using wireless communication technology, use of RFID system is increasing in various fields. According to that, related security problems are becoming important issue. Up to now, many authentication protocols have been proposed to solve security problem of RFID system. In this paper, We show that the RFID authentication protocols in [9, 10], which are compatible with Type C RFID system in ISO 18000-6 Amd1[8], are vulnerable to a spoofing attack. In addition, we propose improved protocols having small additional cost over the original protocols.
Keywords
RFID security; RFID authentication protocol; RFID standard;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "Radio Frequency Identification: Applications and Implications for Consumers," Workshop Report from the Staff of the Federal Trade Commission, Federal Trade Commission, Mar. 2005.
2 정보통신단체표준(잠정표준) TTAI.KO-12.0091, "수동형 RFID 보안태그와 리더의 인증 및 데이터 보호프로토콜," 2008년 12월.
3 최용제, 최두호, 이상연, 정교일, "수동형 RFID를 위한 보안 기술 구현," 한국통신학회 하계종합학술 발표회, pp. 96-99, 2008년 7월.
4 S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2004.
5 ISO/IEC 18000-6 Amd1, "Information technology -Radio frequency identification for item management - Part 6:Parameters for air interface communications at 860 MHz to 960 MHz, AMENDMENT 1: Extension with Type C and update of Types A and B," 2004.
6 S.M. Lee, Y.J. Hwang, D.H. Lee, and J.I. Lim, "Efficient Authentication for Low-Cost RFID Systems," International Conference on Computational Science and its Applications 2005, LNCS 3480, pp. 619-627, 2005.
7 K.W. Rhee, J. Kwak, S.J. Kim, and D.H. Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment," International Conference on Security in Pervasive Computing 2005, LNCS 3450, pp. 70-84, 2005.
8 M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Communications of the ACM, vol. 36, no. 7, pp. 74-84, July 1993.
9 N. Borselius, "Mobile Agent Security," Electronics and Communication Engineering Journal, vol. 14, no. 5, pp. 211-218, Oct. 2002.
10 A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal of Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, Feb. 2006.   DOI