Browse > Article

Efficient RFID Secure Protocol with Forward Secrecy  

Kim, Seong-Yun (부산대학교 컴퓨터공학과)
Kim, Ho-Won (부산대학교 컴퓨터공학과)
Publication Information
Journal of Internet Computing and Services / v.12, no.6, 2011 , pp. 139-147 More about this Journal
Abstract
We proposed the secure and efficient passive RFID protocol which is based on one-way hash based low-cost authentication protocol (OHLCAP). The paper introduces OHLCAP and the vulnerabilities of OHLCAP and suggests security solutions by analyzing them. Afterwards, The paper presents the proposed protocol and demonstrates computational performance and security of the protocol. This protocol not only has the resistances against eavesdropping attack, impersonation attack, desynchronization attack, and replay attack but also provides untraceability and forward secrecy.
Keywords
RFID Protocol; Security; Mutual Authentication; Forward Secrecy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Kwon, D. Han, J. Lee, and Y. Yeom, "Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq2005", EUC2006, LNCS 4097, pp. 262-270, 2006.
2 JeaCheol Ha, SangJae Moon, Juan Manuel Gonzalez Nieto, Colin Boyd, "Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol", Emerging Technologies in Knowledge Discovery and Data Mining, vol. 4819, pp. 574-583, 2007.
3 He Lei, Lu Xin-mei, Jin Song-he, Cai Zeng-yu, "A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System", 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics, vol.2, pp.269-272, 2010.
4 K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment", SPC'05, LNCS 3450, pp. 70-84, 2005.
5 S. Lee, Y. Hwang, D. Lee, and J. Lim, "Efficient Authentication for Low-cost RFID Systems", ICCSA'05, LNCS 3480, pp. 619-627, 2005.
6 Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks", Security and Privacy for Emerging Areas in Communications Networks-2005, pp. 59-66, Sep. 2005
7 J.C. Ha, J.H. Ha, S.J. Moon, and C. Boyd, "LRMAP: Lightweight and Re- synchronous Mutual Authentication Protocol for RFID System", ICUCT'06, LNCS 4412, pp. 80-89, 2006.
8 P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, T. Li, and L.Tong Lee, "Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard", RFIDSec 2008, 2008.
9 Elif Bilge Kavun and Tolga Yalcin, "A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications", RFIDSec 2010, vol. 6370, pp.258-269, 2010
10 M. O'neill, "Low-Cost SHA-1 Hash Function Architecture for RFID Tags", RFIDSec 2008, 2010
11 Eun Young Choi, Su Mi Lee, Dong Hong Lee, "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment", Embedded and Ubiquitous Computing, vol. 3823, pp. 945-.954, 2005