[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation

  • Conference paper
Advances in Hybrid Information Technology (ICHIT 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4413))

Included in the following conference series:

Abstract

RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, many kinds of security and privacy enhancement technologies have been researched. However, solutions produced to date still have flaws and are not sufficiently effective for real RFID systems such as the EPCglobal networkTM. Therefore, in this paper, to make RFID systems more secure and efficient, improved technology based on password, is proposed. The proposed technology combines an encryption algorithm with a password-derived key, and can be applied to low-cost RFID systems for enhancing the security and privacy of these systems.

This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aigner, M., Feldhofer, M.: Secure Symmetric Authentication for RFID Tags. In: Telecommunications and Mobile Computing 2005 (TCMC2005), Graz, Austria (March 8-9, 2005)

    Google Scholar 

  2. The Boycott Benetton website, http://www.boycottbenetton.com/

  3. EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.0.9 (January 31, 2005), http://www.epcglobalinc.org

  4. Garfinkel, S.L., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. Security and Privacy Magazine 3(3), 34–43 (2005)

    Article  Google Scholar 

  5. GS1 US, Glossary Version 6.0 (May 2005)

    Google Scholar 

  6. Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)

    Google Scholar 

  7. Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PERCOMW 2004. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149–153. IEEE, Los Alamitos (2004)

    Google Scholar 

  8. Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P. (ed.) Algorithmic Number Theory. LNCS, vol. 1423, pp. 267–283. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)

    Google Scholar 

  10. Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for consumer Privacy. In: Proceedings of 10th ACM Conference on Computer and Communications Security, pp. 103–111. ACM Press, New York (2003)

    Chapter  Google Scholar 

  11. Jeuls, A.: Minimalist cryptography for Low-Cost RFID Tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)

    Google Scholar 

  12. Kwak, J., Rhee, K., Oh, S., Kim, S., Won, D.: RFID System with Fairness within the Framework of Security and Privacy. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 142–152. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: ACM CCS. Proceedings of Conference on Computer and Communications Security, pp. 210–219. ACM Press, New York (2004)

    Google Scholar 

  14. NTRU Cryptosystems Inc., http://www.ntru.com/

  15. Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID. In: Proceedings of the SCIS 2004, pp. 719–724 (2004)

    Google Scholar 

  16. Philips, http://www.semiconductors.philips.com/

  17. Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-Response based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)

    Google Scholar 

  18. Saito, J., Ryou, J.-C., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)

    Google Scholar 

  19. Sarma, S.: Towards the Five-Cent Tag, White paper, MIT Auto-ID Center (2001)

    Google Scholar 

  20. Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  21. Shepard, S.: RFID-Radio Frequency Identification. McGraw-Hill, New York (2005)

    Google Scholar 

  22. Weis, S.: Security and Privacy in Radio-Frequency Identification Devices. MS Thesis, MIT (May 2003)

    Google Scholar 

  23. Weis, S., Sarma, S., Rivest, R.L., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Marcin S. Szczuka Daniel Howard Dominik Ślȩzak Haeng-kon Kim Tai-hoon Kim Il-seok Ko Geuk Lee Peter M. A. Sloot

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rhee, K. et al. (2007). Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. In: Szczuka, M.S., et al. Advances in Hybrid Information Technology. ICHIT 2006. Lecture Notes in Computer Science(), vol 4413. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77368-9_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77368-9_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77367-2

  • Online ISBN: 978-3-540-77368-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics