Advertisement

Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems

  • Kyoung Hyun Kim
  • Eun Young Choi
  • Su Mi Lee
  • Dong Hoon Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4277)

Abstract

Radio Frequency Identification (RFID) system is an important technology in ubiquitous computing environment. RFID system should be compatible with most RFID system applications to support the ubiquitous computing environment. Recently, researchers had studied about RFID standardization. After all, EPCglobal Class-1 Gen-2 (C1G2) RFID is selected as an international standard of RFID systems. Unfortunately, it has fatal security problems to be vulnerable to information leakage and traceability since a tag of EPCglobal C1G2 emits its fixed ID(EPC) without hiding or modifying. A main goal of our work is to propose the secure protocol well suitable for EPCglobal C1G2. First of all, our protocol exactly follows RFID standard with only current capabilities of a tag approved in the standard, assuring that our protocol is secure against impersonation, information leakage, and traceability etc.

Keywords

Information Leakage Electronic Product Code Ubiquitous Computing Environment Cyclic Redundancy Code Legitimate Reader 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Juels, A., Rivest, R.L., Szudlo, M.: The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy. In: The 8th ACM Conference on Computer and Communications Security, pp. 103–111. ACM Press, New York (2003)CrossRefGoogle Scholar
  2. 2.
    Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency identification systems. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Ohkubo, M., Suxuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: Ubicomp 2004 workshop (2004)Google Scholar
  4. 4.
    Avoine, G., Oechslin, P.: A scalable and Provably Secure Hash-Based RFID Protocol. In: IEEE PerSec 2005, Kauai Island, Hawail (March 2005)Google Scholar
  5. 5.
    Su Mi, L., Young Ju, H., Dong Hoon, L., Jong In, L.: Efficient Authentication for Low-Cost RFID systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–629. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Eun Young, C., Su-Mi, L., Dong Hoon, L.: Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. In: EUC Workshops (2005)Google Scholar
  7. 7.
    Weis, S.A., Sarma, S.E., Weis, S.A., Engels, D.W.: Security and privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: First International Conference on Security in Pervasive Computing (2003), http://theory.lcs.mit.edu/sweis/spc-rfid.pdf
  8. 8.
    Juels, A.: Strenthening EPC Tag against Cloning. In: Proceedings of WiSe 2005 (to appear)Google Scholar
  9. 9.
    Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec 2004 at IEEE PerCom (2004)Google Scholar
  10. 10.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Effiient Hash-Chain Based RFID Privacy Protection Scheme. In: The Proceedings of International Conference on Ubiquitous Computing, Workshop Privacy (2004)Google Scholar
  11. 11.
    Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning. In: The Symposium on Cryptography and Information Security (2006)Google Scholar
  12. 12.
  13. 13.
    EPCglobal Inc., Class 1 Generation 2 UHF RFID protocol for communication at 860Mhz-960Mhz version 1.0.9Google Scholar
  14. 14.
    EPCglobal Inc., EPCglobal Object Name Service (ONS) 1.0Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kyoung Hyun Kim
    • 1
  • Eun Young Choi
    • 1
  • Su Mi Lee
    • 1
  • Dong Hoon Lee
    • 1
  1. 1.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea

Personalised recommendations