Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.2.57

RFID Mutual Authentication Protocol Providing Improved Privacy and Resynchronization  

Kim, Young-Jae (Kyungpook National University)
Jeon, Dong-Ho (Kyungpook National University)
Kwon, Hye-Jin (Kyungpook National University)
Kim, Soon-Ja (Kyungpook National University)
Abstract
Hash based RFID protocols proposed by Ha and M.Burmester is a scheme that tag's ID is updated using hash function to provide forward secrecy after session end. But this protocols have a problem both privacy and efficiency. This paper analyze a problem for privacy to apply a privacy game model proposed by Vaudenay. we analyze the cause that these scheme is difficult with tag's cheap implementation and efficient resynchronization. To solve these problems, we proposed a new hash based mutual authentication protocol which apply only two protocol's advantages. this protocols is based of resynchronization algorithm for Ha et al.'s protocol and added a new simple counter to record the numner of continuous desynchronization between tag and reader secret informations. this counter is more simple than cyclic counter proposed by M. Burmester's protocol. Also, we prove that proposal protocol improve a privacy against a privacy attack which is executed for Ha and M. Burmester's protocols.
Keywords
RFID; Security; Privacy; Adversary; Resynchroinzation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Bunmester, B. de Medeiros, and R. Motta, "Anonymous RFID authentication supporting constant-cost key lookup against active adversaries," Int. J. Applied Cryptography, vol. 1, no. 2, pp. 79-90, Nov. 2008.   DOI   ScienceOn
2 V. Shoup, "Sequences of Gam es: A Tool for Taming Complexity In Security Proofs," IACR ePrint 2004-332, Jan. 2006.
3 K. Finkenzeller, RFID Handbook: Fundamentals and Application s in Contactless Smart Cards and Identification, WILEY, May 2003.
4 S.A. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," Security In Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2004.
5 G. Avoine and P. Oechslin, "A Scalable and. Provably Secure Hash-based RFID Protocol," IEEE PerSec 2005, pp. 110-114, Mar. 2005.
6 D. Henrici and P. Muller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. PERCOMW'04, pp. 149-153, Mar. 2004.
7 S.M. Lee, Y.J. Hwang, D.H. Lee, and J.I. Lim, "Efficient Authentication for Low-Cost RFID Systems," ICCSA 2005, LNCS 3480, pp. 619-627, 2005.
8 이용한, 김지영, 정지훈, "무선인식 (RFID) 개인 정보보호에 관한 국내외 동향 조사연구," 한국유통 물류진흥원, 2006년 6월.
9 J.C. Ha, J.H. Ha, S.J. Moon, and C. Boyd, "LRMAP: Light weight and Resynchronous Mutual Authentication Protocol for RFID System," Ubiquitous Convergence Technology, LNCS 4412, pp. 80-89, 2007.
10 여준호, 최신 RFID 기술, 홍릉과학출판사, 2008년 8월.
11 S. Vaudenay, "Mutual Authentication in RFID: Security and Privacy," ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), ACM Press, pp. 292-299, Mar. 2008.
12 남상엽, 김근은, 강이철, 박정석, RFID 구현 및 응용, 도서출판 상학당, 2008년 6월.
13 S. Garfinkel and B. Rosenberg, RFID : applications, security and privacy, Addison-Wesley, July 2005.
14 S. Vaudenay, "On privacy models for RFID," Advances in cryptology, ASIACRYPT 2007, LNCS 4833, pp. 68-87, 2007.