Browse > Article

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments  

Seo, Dae-Hee (이화여자대학교 컴퓨터공학과)
Baek, Jang-Mi (순천향대학교 컴퓨터공학부)
Cho, Dong-Sub (이화여자대학교 컴퓨터공학과)
Abstract
RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.
Keywords
Ubiquitous Environment; Mutual Authentication; RFID Management; Passive RFID Tag;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Avoine G., and Oechslin P., "RFID Traceability: A Multilayer Problem," Financial Cryptography - FC'05, LNCS, Springer, 2005
2 Sanjay E.Sarma, "Towards the five-cent Tag," Technical Report MIT-AUTOID-WH006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org
3 Juels A., "Authentication Pervasive Devices with Human Protocols," Crypto 2005, Aug. 205.
4 Henrici D., and Paul M., "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," PerSee'04 at IEEE PerCom. pp.149-153, 2004
5 Jules A., and Pappu R, Squealing E., "Privacy protection in RFID-enabled banknotes, In processing of Financial Cryptography," FC'03, vol.2742 LNCS, pp.103-121, Sep 2003
6 MIT Auto-ID Center. http://www.autoidcenter.org
7 Jeong-kyu Y., Ren K, and Kwan-gio K, "Security and Privacy on Authentication Protocol for Low-cost RFID," Symposium on Cryptography and Information Security, Jan., 2005
8 Gilbert, H., Sibert, H., and Robshaw, M., "An Active Attack Against a Provably Secure Lightweignt Authentication Protocol," Preliminary Version, 2005
9 Kideok Cho, Sangheon Pack, Taekyoung Kwon, and Yanghee Choi, "SRMS: SIP-based RFID Management System," in Proc. IEEE International Conference on Pervasive Services (ICPS) 2007, Istanbul, Turkey, July 2007
10 Junichiro S., Jae-Cheol R and Kouichi S., "Enhancing privacy of Universal Reencryption scheme for RFID Tags," EUC 2004, vol.3207 LNCS, pp.879-890, Dec. 2004
11 Stephen A. Weis, "Security and Privacy in RadioFrequency Identification Devices," Masters Thesis. MIT. May, 2003
12 Castro, Miguel and Barbara Liskov, "Practical Byzantine Fault Tolerance," Operating Systems Design and Implementation, 1999, (http://www.pmg.lcs.mit.edu/~castro/osdi99_html/osdi99.html)
13 Dimitriou T., "A lightweight Iiid protocol to protect against traceability and cloning attacks," IEEE, SECURECOMM, 2005
14 Katz J., and Ji-Sun S., "Prallel and Concurrent Security of the HB and HB+ Protocols," Cryptology ePrint Archive: Report 2005/461 (to appear in the preceedings of Eurocrypt 2006)
15 Bono, S., Green, M,., Stubblefield, A., Julels, A., Rubin, A., and Szydlo, M., "Security Analysis of a Cryptographically-Enabled RFID Device," In USENIX Security, 2005. (Available at http://rfidanalysis.org/.)
16 Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/sweis/spcIiid.pdf
17 Bringer J, Chabanne H., and Dottax E., "HB++ : a Lightweight Authentication Protocol Secure Against Some Attacks," IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006
18 D.N. Due, J. Park, H. Lee and K Kim, "Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning," The 2006 Symposium on Cryptography and Information Security, 2006
19 RFID Journal. Gillette to Purchase 500 Million EPC Tags, http://www.Iiidjournal.com
20 Ohkubo M., Suzuki K, and Kinoshita S., "Cryptographic Approach to "Privacy-Friendly" Tag" RFID Privacy Workshop@MIT, Nov, 2003
21 D-H, Seo, I-Y Lee, "A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment," Journal of the Korean Institute of Information Security and Criptology, vol.16, no.2, pp.81-94, 2006
22 Hung-Yu Chien and Che-Hao Chen, "Mutulaauthentication protocol for RFID conforming to EPC Class 1 Generation 2 Standards," Computer Standards & Interfaces, vol.29, pp.254-259, Feb., 2007   DOI   ScienceOn
23 Juels A., "Minimalist cryptography for Low-Cost RFID Tag," In The Fourth International Conference on Security in Communication Networks-SCN 2004, vol.3352, LNCS, pp.149-164, Sep. 2004
24 Su-Mi L., Young-Ju H., Dong-Hoon L., and Jong L., "Efficient Authentication for Low-Cost RFID systems," ICCSA05, vol.3480 LCNS, pp.619-629, May 2005