Security Analysis on Anonymous Mutual Authentication Protocol for RFID Tag without Back-End Database and its Improvement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Security Analysis on Anonymous Mutual Authentication Protocol for RFID Tag without Back-End Database and its Improvement

Authors: Songyi Kim, Kwangwoo Lee, Seungjoo Kim, Dongho Won

Abstract:

RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many researchers have proposed the solution of the problems. However, they still have the problem, such as location privacy, mutual authentication. In this paper, we show the problems of the previous protocols, and then we propose a more secure and efficient RFID authentication protocol.

Keywords: RFID, mutual authentication, serverless, anonymity.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1333472

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1941

References:


[1] C.C. Tan, B.Sheng, and Qun Li, "Serverless Search and Authentication Protocols for RFID", Pervasive Computing and Communications 2007(PerCom 2007), pp.3-12, August. 2007.
[2] C.C. Tan, B.Sheng, and Qun Li, "Secure and Serverless RFID Authentication and Search Protocols", IEEE Transactions on Wireless Communications, vol.7, no.4, pp.1400-1407, April. 2008.
[3] S. Han, T.S.Dillon, and E. Chang, "Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database", Springer, Mobile Sensor Networks 2007(MSN 2007), Lecture Notes in Computer Science vol.4864, pp.623-632, November 2007.
[4] Dirk Henrici and Paul Muller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", Proceedings of Workshop on Pervasive Computing and Communications Security, pp.149-153, 2004.
[5] JangYoung Chung, YoungSik Hong, "RFID Authentication Protocol Verification in Serverless Environment", Korea information science society, vol.35, no.1-(A), pp.140-145, June 2008.
[6] Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment", International Conference on Security in pervasive Computing (SPC), pp.70-84, 2008.
[7] Hye-Jin Kwon, Jae-Wook Lee, Dong-Ho Jeon, and Soon-Ja Kim, "Easy to Search for Tags on Database and Secure Mutual Authentication Protocol for RFID system", Korea institute of information security and cryptology, vol. 18, no.5, pp.125-134, 2008.
[8] Batbold Toiruul, KyungOh Lee, HyunJun Lee, YoungHan Lee, and Yoon Young Park, "Mutual-Authentication Mechanism for RFID Systems", Lecture Notes in Computer Science, vol.4325, pp.449-460, 2006.
[9] Manfred Aigner and Martin Feldhofer, "Secure Symmetric Authentication for RFID Tags", Telecommunication and Mobile Computing(TCMC), March 2005.
[10] Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, and Tatsuo Nakajima, "S3PR:Secure Serverless Search Protocols for RFID", Information Security and Assurance, pp.187-192, April 2008.