Skip to main content

High Attack Cost: Hash Based RFID Tag Mutual Authentication Protocol

  • Conference paper
  • First Online:
Computer Science and Convergence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 114))

Abstract

Radio Frequency Identification (RFID) systems are expected to replace barcode systems in object identification fields in the future, but various security problems are obstructing their diffusion. This paper proposes hash-based RFID tag mutual authentication protocol to solve these security problems of RFID systems. The proposed protocol is designed to demand high cost of acquiring the tag information from attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Finkenzeller K (2002) Fundamentals and applications in contactless smart cards and identification RFID handbook, 2nd edn. Wiley, New York

    Google Scholar 

  2. EPC global Inc (2008) EPC Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz Version 1.2.0.

    Google Scholar 

  3. Juels A (2006) RFID security and privacy: a research survey. Sel Areas Commun 24(2):381–394

    Article  MathSciNet  Google Scholar 

  4. Yeo S, Kim S (2005) Scalable and flexible privacy protection scheme for RFID systems. In: European workshop on security and privacy in Ad hoc and Sensor Networks—ESAS’05, Lecture Notes in Computer Science, vol 3813. Springer, Heidelberg, pp 153–163

    Google Scholar 

  5. Dimitriou T (2005) A lightweight RFID protocol to protect against traceability and cloning attack. In: Proceedings of SECURECOMM’05

    Google Scholar 

  6. Cho J-S, Kim S-C, Yeo S-S (2011) RFID system security analysis, response strategies and research directions. In: Ninth IEEE international symposium on parallel and distributed processing with applications workshops, IEEE Computer Society, pp 371–376

    Google Scholar 

  7. Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to privacy-friendly tag. In: P RFID Privacy Workshop, MIT, Cambridge

    Google Scholar 

  8. Weis SA, Sarma SE, Rivest RL, Engels DW (2003) Security and privacy aspects of low-cost radio frequency identification systems. Security in prevasive computing. LNCS 2802:201–212

    Google Scholar 

  9. Liang B (2010) Security and performance analysis for rfid protocols. dissertations and theses collection, paper 52, http://ink.library.smu.edu.sg/etd_coll/52

  10. Vahedi E, Ward R, Blake I (2011) Security analysis and complexity comparison of some recent lightweigth RFID protocols. Computational intelligence in security for information systems

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology(2011-0024052).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James J. (Jong Hyuk) Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Cho, JS., Park, J.J. (2012). High Attack Cost: Hash Based RFID Tag Mutual Authentication Protocol. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2792-2_11

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2791-5

  • Online ISBN: 978-94-007-2792-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics