JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Performance Evaluation of Authentication Protocol for Mobile RFID Privacy
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Performance Evaluation of Authentication Protocol for Mobile RFID Privacy
Eom, Tae-Yang; Yi, Jeong-Hyun;
  PDF(new window)
 Abstract
Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. Although the users can get the information about a certain product anytime anywhere, there is high probability that their privacy may be violated because their belongings with RFID tags can be scanned by other mobile readers at any time. Several RFID authentication schemes have been proposed to deal with these privacy issues. However, since the existing solutions require heavy computation on the tag side, most of them is not applicable to the general low-cost passive tags which do not have any processing unit. In this paper, we propose the efficient authentication scheme for mobile RFID system applicable to the passive tags as well as the active ones by the best use of computing capability of mobile devices. The proposed scheme satisfies the import security issues such as tag protection, untraceability, anti-traffic analysis. We also implement the proposed scheme on top of real smartphone for feasibility and show the experimental results from it.
 Keywords
Mobile RFID;Passive Tag;RFID Authentication Protocol;
 Language
Korean
 Cited by
1.
안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜,이영석;최훈;

한국정보통신학회논문지, 2015. vol.19. 2, pp.357-364 crossref(new window)
2.
안전한 사물 인터넷 환경을 위한 인증 방식,이영석;

한국정보전자통신기술학회논문지, 2015. vol.8. 1, pp.51-58 crossref(new window)
 References
1.
A. Juels, "Minimalist Cryptography for Low-cost RFID Tags," International Conference on Security in Communication Networks(SCN '04), pp.149-164, September 2004.

2.
A. Juels and R. Pappu, "Squealing Euros: Privacy Protection in RFID-Enabled Banknotes," Financial Cryptography(FC '03), pp. 103-121, 2003

3.
A. Juels, R. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," ACM Conference on Computer and Communications Security (CCS '03), pp.103-111, October 2003.

4.
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001.

5.
B. Bing. Broadband Wireless Access, Boston, Kluwer Academic Publishers, 2000.

6.
Boyeon Song, and Chris J Mitchell, "RFID Authentication Protocol for Low-cost Tags," ACM Conference on Wireless Network Security (WiSec'08), March, 2008.

7.
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," ACM Conference Commun. Comput. Security(CCS '04), pp. 210-219, 2004.

8.
D. Henrici, P. Muller, "Providing Security and Privacy in RFID Systems Using Triggered Hash Chains," IEEE International Conference on Pervasive Computing and Communications (PerCom'08), pp.50-59, 2008.

9.
E. Fujisaki and T. Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes," CRYPTO '99, pp.537-554, 1999.

10.
EPCglobal, "UHF Class-1 Generation-2 Standard v.1.2.0," 05, 2008.

11.
G. Karjoth and P. Moskowitz, "Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced," ACM workshop on Privacy in the electronic society '05, pp.27-30, November 2005.

12.
K. Osaka, T. Takagi, K. Yamazaki and O. Takahash, "An Efficient and Secure RFID Security Method with Ownership Transfer," Computational Intelligence and Security, pp. 1090-1095, 2006.

13.
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Efficient hash-chain based RFID privacy protection scheme," International Conference on Ubiquitous Computing (Ubicomp '04), September 2004.

14.
Ming Hour Yang and Jia-Ning Luo, "Authentication Protocol in Mobile RFID Network," International Conference on Systems, pp.108-113, 2009.

15.
mClock: Personal / corporate management of wireless devices and technology, 2003. product description at www.mobileclock.com.

16.
S. Garfinkel, "An RFID Bill of Rights, Technology Review," 2002, available at http://www.technologyreview.com/articles/garfinkel1002.asp

17.
S. Inoue and H. Yasuura, "RFID Privacy using User-controllable Uniqueness," RFID Privacy Workshop, November 2003. http://www.rfidprivacy.org/papers/sozo_inoue.pdf.

18.
S. Sarma, S. Weis, and D. Engels, "RFID Systems and Security and Privacy Implications," Workshop on Cryptographic Hardware and Embedded Systems, pp.454-470, 2002.

19.
S. Weis, S. Sarma, R. Rivest, and D. Engels. "Security and Privacy Aspects of Low-Cost Radio Frequency Identication Systems," In Security in Pervasive Computing, pp.201-212, 2004.

20.
UHF RFID Reader Dongle, http://www.nesslab.com/rfid_04_22.php