Browse > Article
http://dx.doi.org/10.7236/JIWIT.2011.11.4.061

A Study On RFID Security Enhancement Protocol Of Passive Tag Using AES Algorithm  

Kim, Chang-Bok (가천의과학대학교 정보공학부)
Kim, Nam-Il (가천의과학대학교 정보공학부)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.11, no.4, 2011 , pp. 61-68 More about this Journal
Abstract
Recently arithmetic circuit of lightweight AES symmetric key algorithm that can apply to passive tag have been developed, then security protocol of RFID system using AES symmetric encryption techniques have been proposed. This paper proposed security enhancement protocol of RFID system using lightweight AES arithmetic circuit and random number generator of passive tag. The proposed protocol have AES algorithm and random number generator at server, reader, tag, and transmit encrypted message by separate secret key using random number at each session. The mutual authentication of tag and reader used reader random number and tag random number. As a result, proposal protocol reduce authentication steps of the existing mutual authentication protocol, and reduce amount of computation of tag, and demonstrate as secure protocol to every attack type of attacker by decrease communication step of Air Zone.
Keywords
RFID; Hash Algorithm; AES Algorithm; Mutual Certification; Information Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 정보통신부, 한국정보보호진흥원, "RFID 프라이버시 보호 가이드라인", 9, 2007.
2 S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo, "Security Analysis of a Cryptographically-Enabled RFID Device", In Proceeding 14th USENIX Security Symposium, pp. 1-16, 2005.
3 A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal On Selected Areas In Communications, Vol. 24, No. 2, pp. 381-394, Feb. 2006.   DOI
4 M. Feldhofer, and C. Rechberger, "A Case Against Currently Used Hash Functions in RFID Protocols", On the Move to Meaningful Internet Systems, LNCS 4277, pp. 372-381, 2006.
5 S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In Security in Pervasive Computing, LNCS 2802, pp. 201-212, 2005.
6 M. Ohkubo, K. Suzuki, and S. Kinoshita, "A Cryptographic Approach to 'Privacy-Friendly' tag", RFID Privacy Workshop, 2003.
7 M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm", Cryptographic Hardware and Embedded Systems, LNCS 3156, pp. 85-140, 2004.
8 B. Toiruul, and K.O. Lee, "An Advanced Mutual Authentication Algorithm Using AES for RFID Systems", International Journal of Computer Science and Network Security, Vol. 6, No. 9B, pp. 156-162, Sep 2006.
9 鄭京鎬, "대칭키 기반의 순차적 키 갱신을 이용한 RFID 상호 인증 프로토콜", 慶北大學校工學博士學位論文, 12. 2010.
10 EPCglobal Inc., "Radio Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9.", http://www.EPCgloballinc.org