Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation

  • Keunwoo Rhee
  • Jin Kwak
  • Wan S. Yi
  • Chanho Park
  • Sangjoon Park
  • Hyungkyu Yang
  • Seungjoo Kim
  • Dongho Won
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4413)

Abstract

RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal networkTM. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.

Keywords

RFID EPCglobal networkTM authentication encryption algorithm password password-derived key 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aigner, M., Feldhofer, M.: Secure Symmetric Authentication for RFID Tags. In: Telecommunications and Mobile Computing 2005 (TCMC2005), Graz, Austria (March 8-9, 2005)Google Scholar
  2. 2.
    The Boycott Benetton website, http://www.boycottbenetton.com/
  3. 3.
    EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.0.9 (January 31, 2005), http://www.epcglobalinc.org
  4. 4.
    Garfinkel, S.L., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. Security and Privacy Magazine 3(3), 34–43 (2005)CrossRefGoogle Scholar
  5. 5.
    GS1 US, Glossary Version 6.0 (May 2005)Google Scholar
  6. 6.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)Google Scholar
  7. 7.
    Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PERCOMW 2004. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149–153. IEEE, Los Alamitos (2004)Google Scholar
  8. 8.
    Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P. (ed.) Algorithmic Number Theory. LNCS, vol. 1423, pp. 267–283. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  9. 9.
    Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)Google Scholar
  10. 10.
    Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: Proceedings of 10th ACM Conference on Computer and Communications Security, pp. 103–111. ACM Press, New York (2003)CrossRefGoogle Scholar
  11. 11.
    Jeuls, A.: Minimalist cryptography for Low-Cost RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)Google Scholar
  12. 12.
    Kwak, J., Rhee, K., Oh, S., Kim, S., Won, D.: RFID System with Fairness within the Framework of Security and Privacy. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 142–152. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: ACM CCS. Proceedings of Conference on Computer and Communications Security, pp. 210–219. ACM Press, New York (2004)Google Scholar
  14. 14.
    NTRU Cryptosystems Inc., http://www.ntru.com/
  15. 15.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: Proceedings of the SCIS 2004, pp. 719–724 (2004)Google Scholar
  16. 16.
  17. 17.
    Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)Google Scholar
  18. 18.
    Saito, J., Ryou, J.-C., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)Google Scholar
  19. 19.
    Sarma, S.: Towards the Five-Cent Tag, White paper, MIT Auto-ID Center (2001)Google Scholar
  20. 20.
    Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  21. 21.
    Shepard, S.: RFID-Radio Frequency Identification. McGraw-Hill, New York (2005)Google Scholar
  22. 22.
    Weis, S.: Security and Privacy in Radio-Frequency Identification Devices. MS Thesis, MIT (May 2003)Google Scholar
  23. 23.
    Weis, S., Sarma, S., Rivest, R.L., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Keunwoo Rhee
    • 1
  • Jin Kwak
    • 2
  • Wan S. Yi
    • 1
  • Chanho Park
    • 3
  • Sangjoon Park
    • 1
  • Hyungkyu Yang
    • 4
  • Seungjoo Kim
    • 1
  • Dongho Won
    • 1
  1. 1.Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon-si, Gyeonggi-do, 440-746Korea
  2. 2.Department of Information Security, Soonchunhyang University, 646 Eupnae-ri, Shinchang-myun, Asan-si, Chungcheongnam-do, 336-745Korea
  3. 3.INDI SYSTEM Co., Ltd., 187-10 Guro-dong, Guro-gu, Seoul, 152-848Korea
  4. 4.Department of Computer and Media Engineering, Kangnam University, Gugal-dong, Giheung-gu, Yongin-si, Gyeonggi-do, 446-702Korea

Personalised recommendations