Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID

랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜

  • 이영진 (충북대학교 전자계산학과 네트워크보안 연구실) ;
  • 문형진 (충북대학교 전자계산학과 네트워크보안 연구실) ;
  • 정윤수 (충북대학교 전자계산학과 네트워크보안 연구실) ;
  • 이상호 (충북대학교 전기전자컴퓨터공학부 및 컴퓨터정보통신연구소)
  • Published : 2006.07.01

Abstract

Previous RFID technique, it is recognizable without the physical contact between the reader and the tag, causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. Especially the information security problem of read only tag is solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which is adopted to read-only tag and secure to several attacks using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking.

기존 RFID 기술은 리더와 태그사이에 물리적인 접촉 없이 인식 가능하고 태그의 정보가 전송과정에 무선특성에 따른 과도한 정보 노출과 사용자의 위치정보 추적과 같은 심각한 프라이버시 침해를 유발시킨다. 특히 읽기전용 태그에서의 보안문제는 단지 물리적 방법으로만 해결하고 있다. 이 논문에서는 간단한 XOR연산과 부분 ID를 이용하여 다양한 공격에 안전하며 읽기전용 태그에 적합한 저비용 인증 프로토콜을 제안한다. 제안 프로토콜은 재전송, 도청, 위장 및 위치 추적 등 공격에 안전하다.

Keywords

References

  1. S. A. Weis, 'Radio-frequency identifica tion security and privacy', Master's thesis, M.I.T. 2003
  2. S. A. Weis, S. Sarma, R. Rivest, and D. Engels, 'Security and privacy aspects of low-cost radio frequency identification systems', In First International Conference on Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, Springer-Verlag
  3. A. Juels and R. Pappu, 'Squealing Euros : Privacy protection in RFID-enabled bank-notes', Financial Cryptography'03, LNCS 2742, pp. 103-121, Springer-Verlag
  4. D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In B. Preneel and S. Tavares, editors, Selected Areas in Cryptography-SAC 2005, Lecture Notes in Computer Science. Springer-Verlag, 2005
  5. D. Henrici, P. Muller, 'Hash-based Enhancement of Location Privacy for RadioFrequency Identification Devices using Varying Identifiers', Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. PERCOMW '04, pp.149-153, IEEE, 2004
  6. M. Ohkubo, K. Suzuki, and S. Kinoshita (2003), 'A Cryptographic Approach to 'Privacy-Friendly' tag', RFID Privacy Workshop
  7. Junko Yoshida, 'RFID Backlash Prompts 'Kill' Feature,' EETimes. April 28, 2003
  8. A. Juels, R. L. Rivest and M. Szydlo(2003), 'The Blocker Tag : Selective Blocking of RFID Tags for Consumer Privacy', 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111
  9. P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal reencryption for mixnets. In T. Okamoto, editor, The Cryptographers' Track at the RSA Conference-CT-RSA, volume 2964 of Lecture Notes in Computer Science, pages 163-178. Springer-Verlag, 2004
  10. A. Juels, 'Minimalist cryptography for lowcost RFID tags', In 4th Intel. Conf. on Security in Communication Networks-SCN 2004 vol. 3352 LNCS. pp. 149-164
  11. Choi, Eun Young and Lee, Su Mi and Lee, Dong Hoon, 'Efficient RFID Authentication protocol for Ubiquitous Computing Environment' In International Workshop on Security in Ubiquitous Computing Systems - secubiq 2005, Volume 3823 LNCS, pp. 945-95