Browse > Article
http://dx.doi.org/10.7236/JIWIT.2012.12.6.83

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm  

Kang, Min-Sup (Dept. of Compter Engineering, Anyang University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.12, no.6, 2012 , pp. 83-89 More about this Journal
Abstract
This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.
Keywords
Authentication protocol; AES cipher algorithm; RFID system; Verilog HDL;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Jakobsson and D. Pointcheval, "Mutual Authentication for Low-power Mobile Devices," Lecture Notes in Computer Science, pp. 178-195, 2002
2 Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003
3 International Organization for Standardization, "ISO/IEC 18000-3, Information Technology AIDC Techniques - RFID for Item Management," March 2003
4 Martin Feldhofer, "A Proposal for an Authentication Protocol in a Security Layer for RFID Smart Tags," IEEE Proceedings of MELECON 2004, Vol. 2, pp. 759-762, 2004
5 J. Yang, K. Ren, and K. Kim, "Security and Privacy on Authentication Protocol for Low-cost RFID," Proceedings of SCIS2005, Jan., pp. 25-28, 2005
6 D. Eastlake and P. Jones, "US Secure Hash Algorithm 1 (SHA-1)," Internet RFC 3174, September 2001
7 Weis, S., Sarma, S., Rivest, R., and Engels, D., "Security and Privacy Aspects of Low-Cost RFIDs," Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2003
8 Joan Daemen, Vincent Rijmen, "AES Proposal : Rijndael", (http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf)
9 Hae-Jung Kim, Eun-jun Yoon, and Jongjung Woo, "Cryptanalysis and Improvement of an RFID Authentication Protocol Based on Private Codes, Journal of KIIT, Vol. 9, No. 5, pp. 103-110, 2011