Analyses of Security Issues and Requirements for RFID System and Its Application

  • Kim, Jung-Te (Department of Electronic, Mokwon University)
  • Published : 2009.09.30

Abstract

RFID security and privacy issues have been intensively studied in the research field, the authentication between RFID reader and tag is the fundamental them. Most of the existing authentication protocols draw assumptions on classic primitives. Since tags have small capacities, the security mechanisms which are in use in computer networks and communication are not suitable. In this paper, we compare and analyze recent technical research on the problems of privacy and security. It consists of security mechanism, threats and performance evaluation, etc.

Keywords

References

  1. S. A. Weis, S. E. Sarma, R. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proc. 1st Security Pervasive Comput., 2003, vol. 2802, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, pp. 201-212 https://doi.org/10.1007/978-3-540-39881-3_18
  2. P. Ekdahl, and T. Johansson, "Another attack on A5/l ", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003 https://doi.org/10.1109/TIT.2002.806129
  3. I. Vajda and L. Buttyan, "Lightweight authentication protocols for low cost RFID tags," in Proc, 2nd Workshop on Security in Ubiquitous Computer, 2003, pp.76-82
  4. M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.3156, pp.357-370, 2004 https://doi.org/10.1007/978-3-540-28632-5_26
  5. Martin Feldhofer, "Strong crypto for RFID Tag, A comparison of low power hardware implementation", 2007 IEEE, pp.1839-1842 https://doi.org/10.1109/ISCAS.2007.378272
  6. Mangard,S, et aI, "Power analyses attacks-revealing the secrets of smartcards", Springer-ISBN: 0-38730857-1,2007
  7. G.Gaubatz, et.al, "Public key Cryptography in sensor network", 1st European workshop on security in Ad Hoc and sensor networks", ESAS 2004, Aug.2004
  8. M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proc. W orkshopCryptographic Hardware Embedded Syst. (CHES 2004), Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, vol. 3156, pp. 357-370 https://doi.org/10.1007/978-3-540-28632-5_26
  9. Yong Ki Lee, etcs, "Elliptic Curve Based Security Processor for RFID", IEEE Transactions on Computers, v.57. n.ll, pp. 1514-1526, NOV. 2008 https://doi.org/10.1109/TC.2008.148
  10. Pieer E, etcs, "A Fast Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications", The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp.33.-38, 2007
  11. Pieer E, etcs, "A Fast Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications", The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp.33.-38, 2007
  12. Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008 https://doi.org/10.1007/978-3-540-85053-3_18