JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Improved An RFID Mutual Authentication Protocol Based on Hash Function
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Improved An RFID Mutual Authentication Protocol Based on Hash Function
Shin, Ju-Seok; Oh, Se-Jin; Jeong, Cheol-Ho; Chung, Kyung-Ho; Ahn, Kwang-Seon;
  PDF(new window)
 Abstract
In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.
 Keywords
RFID;Authentication;Protocol;Hash Function;Security;
 Language
Korean
 Cited by
1.
환자의 프라이버시 보호와 불법 접근 차단을 위한 RFID 기반 UHISRL 설계,이병관;정은희;

한국산업정보학회논문지, 2014. vol.19. 3, pp.57-66 crossref(new window)
2.
저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계,최원석;김성수;김용환;윤태진;안광선;한기준;

한국통신학회논문지, 2014. vol.39B. 12, pp.831-841 crossref(new window)
 References
1.
S. A. Weis, "Security an Privacy in Radio-Frequency Identification Devices," MS Thesis. MIT. May, 2003.

2.
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W.Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2003.

3.
S. E. Sarma, S. A. Weis, D. W. Engels. "RFID systems, security & privacy implications," White Paper MIT-AUTOID-WH_014, MIT AUTO-ID CENTER, 2002.

4.
A. Juels and R. Pappu, "Squealing euros: privacy protection in RFID-enabled banknotes," In proceedings of Financial Cryptography-FC'03, Vol. 2742 LNCS, pp. 103-121, Springer-Verlag, 2003.

5.
F. Klaus, "RFID handbook," Second Edition, Jone Willey & Sons, 2003.

6.
Dong-ho Jeon, Hae-moon Kim, Hye-jin Kwon, Soon-ja Kim, "Hash-based Mutual Authentication Protocol for RFID Environment", Journal of the Korea Information and Communications Society, 35(1), pp. 42-52, Jan, 2010.

7.
Gene Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol", Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops, pp. 640-643, Mar. 2006.

8.
J. Aragones, A. Martinez-Balleste, and A. Solanas, "A brief survey on rfid privacy and security", In World Congress on Engineering, 2007.

9.
M. Ohkubo, K. Suzuki and S. Kinoshita, "Hash-chain based forward secure privacy protection sheme for low-cost RFID", Proceedings of the 2004 Symposium on Cryptography and formation Security.Sendai, pp. 719-724, 2004.

10.
D.W.Hong, K.Y.Chang, T.J.Park, K.I.Chung, "Trend of Cryptography for Ubiquitous Environment," Electronics and Telecommunications Trends, 20(1), pp. 63-72, Feb, 2005.

11.
Korea Information Security Agency, "RFID Privacy GuideLine", Sep, 2007.

12.
Tae Youn Won, Il Jung Kim, Eun Young Choi, Dong Hoon Lee, "Encryption scheme suitable to RFID Systems based on EPC Generation," Journal of the Korea Institute of Information Security and Cryptology, 18(1), pp. 67-75, Feb, 2008.

13.
Jung-Sik Cho, Sang-Soo Yeo, Sung-Kwon Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value", Computer Communications, Vol. 34, No. 3, pp.391-397, Mar. 2011. crossref(new window)

14.
A. Juels, "RFID security and privacy: a research survey", IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp.381-394, Feb. 2006. crossref(new window)

15.
Hae-Soon Ahn , Ki-Dong Bu , Eun-Jun Yoon , In-Gil Nam, "Improved Authentication Protocol for RFID/USN Environment," Journal of the Institute of Electronics Enginners of Korea, 46(1), pp.1-10. 2009.

16.
Kim-Dae Jung, Jun Moon Seog, "Design of RFID Mutual Authentication Protocol using One Time Random Number", Journal of the Korea Information Science Society, 35(3), pp.243-250, Jun, 2008.

17.
JangYoung Chung, YoungSik Hong, "RFID Authentication Protocol Verification in Serverless Environment", Journal of the Korea Information Science Society, 35(1A), pp.140-145, Jun, 2008.

18.
JaeCheol Ha , JeaHoon Park , JungHoon Ha, HwanKoo Kim, SangJae Moon, "Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System", Journal of the Korea Institute of Information Security and Cryptology, 18(1), pp.77-87, Feb. 2008.

19.
Chia-Hui Wei, Min-Shiang Hwang, Chin, A.Y, "A Mutual Authentication Protocol for RFID". Computing & Processing, vol.13, pp. 20-24. IEEE Computer Society (2011)