Abstract
Recently, as low-cost radio frequency identification (RFID) becomes more pervasive in our daily lives, RFID systems may create new threats to security and privacy of individuals and organizations. It must have secure mutual authentication mechanisms to protect privacy information. However, the previous works on designing security protocols for RFID either do not conform to the EPCglobal Class 1 Generation 2 (GEN-2) standards or suffer from security flaws. In 2007, Chien and Chen proposed a mutual authentication protocol for RFID systems to improve the previous schemes. However, their scheme cannot efficiently retrieve the information of tags from its database for the authentication. To guarantee the quality of the growing popular communication services, it is urgent to construct efficient authentication for both parties of the tag and the back-end server such that the reader can quickly obtain the information of tag from its database. For light-weight calculation power of a tag and protecting the privacy of user (or product), this article proposes the RFID mutual authentication scheme based on GEN-2 standards. The proposed scheme can efficiently retrieve the information of tags from the database in the authentication process. Moreover, the proposed scheme can improve the previous schemes and provide anonymous property and forward secrecy.
Chapter PDF
Similar content being viewed by others
References
EPCglobal, http://www.EPCglobalinc.org/
Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPCglobal GEN-2 FRID tag against traceability and cloning. In: The 2006 Symposium on Cryptography and Information Security (2006)
Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: IEEE International Workshop on Pervasive Computing and Communication Security-PerSec, pp. 149–153 (March 2004)
Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost RFID systems. In: International Conference on Computational Science and its Applications-ICCSA, pp. 619–627 (May 2005)
Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67 (2005)
Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: ACM Conference on Computer and Communications Security-ACM CCS, pp. 210–219 (October 2004)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop (November 2003)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Yang, Y., Ren, K., Kim, K.: Security and privacy on authentication protocol for low-cost radio. In: The 2005 Symposium on Cryptography and Information Security (2005)
Chien, H.Y., Chen, C.H.: Mutul Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards and Interfaces 29, 254–259 (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, HF. (2007). An Efficient Mutual Authentication Protocol on RFID Tags. In: Denko, M.K., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2007. Lecture Notes in Computer Science, vol 4809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77090-9_51
Download citation
DOI: https://doi.org/10.1007/978-3-540-77090-9_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77089-3
Online ISBN: 978-3-540-77090-9
eBook Packages: Computer ScienceComputer Science (R0)