Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16C.6.669

An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID  

Park, Yong-Soo (경북대학교 BK21)
Shin, Ju-Seok (경북대학교 전기전자컴퓨터공학부)
Choi, Myung-Sil (대구가톨릭대학교 기초학부)
Chung, Kyung-Ho (경운대학교 컴퓨터공학과)
Ahn, Kwang-Seon (경운대학교 컴퓨터공학과)
Abstract
By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tag's H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.
Keywords
RFID; Symmetric Key; Hash Function; Authentication protocol; PUF;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Stepan A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Security in Pervasive Computing - SPC 2003, LNCS 2802, pp.201-212, 2004   DOI   ScienceOn
2 Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita, “Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-cost RFID,” Proceedings of the SCIS 2004, pp.719-724, 2004
3 Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, “Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment,” International Conference on Security in Pervasive Computing Environments, pp.70-84, 2005. Springer
4 K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, Computational Intelligence and Security, 2006 International Conference on, Vol.2, No.1, 2006, pp.1090-1095   DOI   ScienceOn
5 류석, “공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구,” 정보처리학회논문지C Vol.13C, No.7, pp.837-842, 2006   과학기술학회마을   DOI
6 구본석, 유권호, 양상운, 장태주, 이상진, “RFID 태그를 위한 초소형 AES 연산기의 구현”, 정보보호학회논문지, 제16권 제5호, pp.67-77, 2006   과학기술학회마을
7 Chae Hoon Lim and Tymur Korkishko, “mCrtton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors,” WISA 2005, LNCS 3786, pp.243-258, 2006   DOI   ScienceOn
8 Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, and Seongtaek Chee, “HIGHT: A New Block Cipher Suitale for Low-Resource Device”, CHES 2006, LNCS 4249, pp. 46-59, 2006   DOI   ScienceOn
9 Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshow, Yannick Seurin, and C. Vikkelsoe, “HEIGHT: PRESENT: An Ultra-Lightweight Block Cipher”, CHES 2007, LNCS 4727, pp.450-466, 2007   DOI   ScienceOn
10 B. Toiruul and KyungOh Lee, “An Advanced Mutual- Authentication Algorithn Using AES for RFID Systems”, IJCSNS International Journal of Computer Science and Network Security, Vol.6, No.9B, pp.156-162, September, 2006
11 KLAUS FINKENZELLER, 'RFID Handbook: Fundamentals and Application in Contactless Smart Cards and Identification', 2nd EdD.,John Wiley & Sons, Ltd. 2003, pp.223.
12 L. Kulseng, Z. Yu, Y. Wei and Y. Guan, “Lightweight Secure Search Protocols for Low-cost RFID Systems,” 2009 29th IEEE International Conference on Distributed Computing Systems, pp.40-48   DOI
13 L. Kulseng, “Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems,” A thesis for the degree of MASTER OF SCIENCE, Iowa State University, Ames, Iowa, 2009
14 최은영, 최동희, 임종인, 이동훈, “저가형 RFID 시스템을 위한 효율적인 인증 프로토콜,” 정보보호학회논문지 15권 5호, pp59-71, 2005   과학기술학회마을
15 D. Nguyen Duc, J. Park, H. Lee and K. Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,” Proc. of SCIS 2006, Abstracts pp.97, Jan. 17-20, 2006, Hiroshima, Japan
16 Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda, “LAMP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags,” in Proc. Second Workshop RFID Security, July 2006
17 Ari Juels, “RFID Security and Privacy: A Research Survey,” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, Vol.24, No.2, Feb., 2006   DOI   ScienceOn
18 김창훈, “타원곡선 암호 시스템의 고속 구현을 위한 VLSI 구조,” 정보처리학회논문 C Vol.15C, No.2, pp.133-140, 2008   과학기술학회마을   DOI   ScienceOn
19 M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. “Strong authentication for RFID systems using AES algorithm,” In Conference of Cryptographic Hardware and Embedded Systems, 2004. Proceedings, pp.357-370, Springer 2004
20 M. Feldhofer and Christian Rechberger, “A Case against Currently Used Hash Functions in RFID Protocols,” OTM Workshops 2006, LNCS 4277, pp.372-381, 2006   DOI   ScienceOn
21 S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, “Design and Implementation of PUF-Based 'Unclonable' RFID ICs for Anti-Counterfeiting and Security Applications”, 2008 IEEE International Conference on RFID, 16-17 April, 2008, pp.58-64, Las Vegas, USA
22 L. Bolotnyy and G. Robins, “Physically Unclonable Function-Based Security and Privacy in RFID Systems”, in Proc. IEEE International Conference on Pervasive Computing and Communications(PerCom 2007), pp.211-218, March, 2007   DOI
23 P.Tuyls and L. Batina, “RFID-Tags for Anti-Counterfeiting”, Topics in Cryptology-CT-RSA 2006, Vol.3860, pp. 115-131   DOI   ScienceOn
24 Sandra Dominikus, Elisabeth Oswald, and Martin Feldhofer, “Symmetric Authentication for RFID Systems in Practice”, Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, Jul., 2005
25 Sungbae Ji, “RFID-enabled Extensible Authentication Framework and Its Applications,” A thesis for the Degree of Master, ICU, 2008
26 S. Kang, D. Lee, and I. Lee, “A study on secure RFID mutual authentication scheme in pervasive computing environment” Computer Communications 31, 2008, pp.4248-4254   DOI   ScienceOn