The Tag Authentication Scheme using Self-Shrinking Generator on RFID System
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
The Tag Authentication Scheme using Self-Shrinking Generator on RFID System

Authors: HangRok Lee, DoWon Hong

Abstract:

Since communications between tag and reader in RFID system are by radio, anyone can access the tag and obtain its any information. And a tag always replies with the same ID so that it is hard to distinguish between a real and a fake tag. Thus, there are many security problems in today-s RFID System. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Adversary can easily cheat the legitimate reader using the collected Tag ID information, such as the any legitimate Tag. These security problems can be typically solved by encryption of messages transmitted between Tag and Reader and by authentication for Tag. In this paper, to solve these security problems on RFID system, we propose the Tag Authentication Scheme based on self shrinking generator (SSG). SSG Algorithm using in our scheme is proposed by W.Meier and O.Staffelbach in EUROCRYPT-94. This Algorithm is organized that only one LFSR and selection logic in order to generate random stream. Thus it is optimized to implement the hardware logic on devices with extremely limited resource, and the output generating from SSG at each time do role as random stream so that it is allow our to design the light-weight authentication scheme with security against some network attacks. Therefore, we propose the novel tag authentication scheme which use SSG to encrypt the Tag-ID transmitted from tag to reader and achieve authentication of tag.

Keywords: RFID system, RFID security, self shrinkinggeneratior, authentication, protocol.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1062926

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1582

References:


[1] Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer. "Strong Authention for RFID Systems Using the AES Algorithm", CHES2004, LNCS 3156, pp.357-370.
[2] Ari Juels. "Minimalist Cryptography for Low-Cost RFID Tags" 2003, In submission.
[3] A. Juels, R.L. Rivest, M. Szydlo. "The Block Tag : Selective blocking of RFID tags for consumer privacy" 8th ACM Conference of Computer and Communications Security, pp 103-111.
[4] K. Finkenzeller. "RFID-Handbook", Carl Hanser Verlag Munchen, 2nd edition 2003.
[5] S. Weis, S.Sarma, R.Rivest, and D.Engel, "Security and privacy aspects of low-cost radio frequency identification systems", In Proceedings of the 1th International Conference on Security in Pervasive Computing 2003.
[6] W. Meier, S. Staffelbach, "Self-Shrinking Generator" Advances in Cryptology EUROCRYPT-94, volume 950 of LNCS, pages 205-214.
[7] M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic Approach to Privacy-Friendly Tags", RFID Privacy Workshop 2003, MIT, MA, USA, Nov. 2003.
[8] D. Henrici and P. Muller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", PerSec-04 at IEEE PerCom, pp.149-153, Mar.2004.
[9] D. Molnar, D. Wagner, "Security and privacy in library RFID : Issues, practices, and architectures", ACM CCS 2004.
[10] Stephen A. Weis, Sanjay E. Sarma, Ronald L.Rivest, and Daniel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems" In Security in Pervasive Computing, LNCS 2802, pp 201-212, 2004.
[11] Yu Ming-yan, Zhou Tong, Wang Jin-xiang, Ye Yi-zheng, "An Efficient ASIC Implementation Of SHA-1 Engine For TPM", IEEE Asia-Pacific Conference on Circuits and Systems, December 6-9, 2004 , pp 873-876.