Abstract
Radio Frequency Identification (RFID) systems are expected to replace barcode systems in object identification fields in the future, but various security problems are obstructing their diffusion. This paper proposes hash-based RFID tag mutual authentication protocol to solve these security problems of RFID systems. The proposed protocol is designed to demand high cost of acquiring the tag information from attackers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Finkenzeller K (2002) Fundamentals and applications in contactless smart cards and identification RFID handbook, 2nd edn. Wiley, New York
EPC global Inc (2008) EPC Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz Version 1.2.0.
Juels A (2006) RFID security and privacy: a research survey. Sel Areas Commun 24(2):381–394
Yeo S, Kim S (2005) Scalable and flexible privacy protection scheme for RFID systems. In: European workshop on security and privacy in Ad hoc and Sensor Networks—ESAS’05, Lecture Notes in Computer Science, vol 3813. Springer, Heidelberg, pp 153–163
Dimitriou T (2005) A lightweight RFID protocol to protect against traceability and cloning attack. In: Proceedings of SECURECOMM’05
Cho J-S, Kim S-C, Yeo S-S (2011) RFID system security analysis, response strategies and research directions. In: Ninth IEEE international symposium on parallel and distributed processing with applications workshops, IEEE Computer Society, pp 371–376
Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to privacy-friendly tag. In: P RFID Privacy Workshop, MIT, Cambridge
Weis SA, Sarma SE, Rivest RL, Engels DW (2003) Security and privacy aspects of low-cost radio frequency identification systems. Security in prevasive computing. LNCS 2802:201–212
Liang B (2010) Security and performance analysis for rfid protocols. dissertations and theses collection, paper 52, http://ink.library.smu.edu.sg/etd_coll/52
Vahedi E, Ward R, Blake I (2011) Security analysis and complexity comparison of some recent lightweigth RFID protocols. Computational intelligence in security for information systems
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology(2011-0024052).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Cho, JS., Park, J.J. (2012). High Attack Cost: Hash Based RFID Tag Mutual Authentication Protocol. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_11
Download citation
DOI: https://doi.org/10.1007/978-94-007-2792-2_11
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2791-5
Online ISBN: 978-94-007-2792-2
eBook Packages: EngineeringEngineering (R0)