Browse > Article

Improving an RFID Mutual Authentication Protocol using One-time Random Number  

Yoon, Eun-Jun (경북대학교 전자전기컴퓨터학부)
Yoo, Kee-Young (경북대학교 컴퓨터공학과)
Abstract
In 2008, Kim-Jun proposed a RFID mutual authentication protocol using one-time random number that can withstand malicious attacks by the leakage of important information and resolve the criminal abuse problems. Through the security analysis, they claimed that the proposed protocol can withstand various security attacks including the replay attack. However, this paper demonstrates that Kim-Jun' s RFID authentication protocol still insecure to the replay attack. In addition, this paper also proposes a simply improved RFID mutual authentication protocol using one-time random number which not only provides same computational efficiency, but also withstands the replay attack.
Keywords
RFID; One-time random number; Mutual Authentication; RFID system; Replay attack;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 S. Junichiro, H. Jae-Cheol and S. Kouichi, "Enhancing privacy of universal re-encryption scheme for RFID tags," EUC 2004, Vol.3207 LNCS, pp. 879-890, Springer-Verlag, 2004
2 M. Ohkubo, K. Suzuki, and S. Kinoshita, "Hashchain based forward-secure privacy protection scheme for low-cost RFID," Proceedings of the SCIS 2004, pp. 719-724, 2004
3 S. E. Sarma, S. A. Weis, D. W. Engels. "RFID systems, security & privacy implications," White Paper MIT AUTOID-WH_014, MIT AUTO-ID CENTER, 2002
4 S. A. Weis, "Security an Privacy in Radio-Frequency Identification Devices," MS Thesis. MIT. May, 2003
5 S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, Springer-Verlag Heidelberg, 2004
6 A. Juels, R. L. Rivest, M Szydlo, "The blocker tag: selective blocking of RFID tags for consumer privacy," In Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111, 2003
7 이근우, 오동규, 곽진, 오수현, 김승주, 원동호, "분산 데이타베이스 환경에 적합한 Challenge-Response 기반의 안전한 RFID 인증 프로토콜" 한국정보처리학회 논문지C, 제12-C권, 제03호, pp. 309-316, 2005
8 S. A. Weis, S. Sarma, R. Rivest, D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, Springer-Verlag, 2001
9 양형규, 안영화, "유비쿼터스 컴퓨팅 환경에 적합한 RFID 인증 프로토콜에 판한 연구" 전자공학회논문지, 제42권, 제CI-1호, pp. 45-50, 2005
10 최은영, 최동희, 임종인, 이동훈, "저가형 RFID 시스템을 위한 효율적인 인증 프로토콜" 정보보호학회논문지, 제15권, 제5호, pp. 59-71, 2005
11 F. Klaus, "RFID handbook," Second Edition, Jone Willey & Sons, 2003
12 A. Juels and R. Pappu, "Squealing euros: privacy protection in RFID-enabled banknotes," In proceedings of Financial Cryptography-FC'03, Vol.2742 LNCS, pp, 103-121, Springer-Verlag, 2003
13 김대중, 전문석, "일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계" 정보과학회논문지, 정보통신, 제35권, 제03호, pp. 243-250, 2008
14 이영진, 정윤수, 서동일, 이상호, "부분ID를 이용한 읽기전용 RFID태그 인증프로토콜" 한국정보처리학회 논문지 C, 제13-C권, 제05호, pp. 595-600, 2006.10