DOI QR코드

DOI QR Code

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol

RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법

  • Received : 2011.05.27
  • Accepted : 2011.05.27
  • Published : 2011.06.30

Abstract

Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

RFID 는 유비쿼터스 환경하에서 필수불가결한 기술이 되도 있다. 그러나 RFID 의 본질적인 단점으로 인하여 프라이버시와 같은 보안적인 취약점을 기자고 있다. 따라서 본 논문에서는 이러한 태그에서의 취약점과 프로토콜의 위협 요소를 살펴보고, 이를 위한 실제적인 기술적인 요소에 대해서 상세히 분석하였다. 특히 현재 표준안으로 사용되고 있는 EPCglobal RFID Gen2에 적용하기 위한 보안성 향상을 위한 기술적인 방법에 대해서 분석하였다.

Keywords

References

  1. George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
  2. A. Juels, "RFID Security and Privacy : A research survey", selected Areas in Communications, IEEE Journal, 2006
  3. S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.
  4. A. Bongdanov, etal, " Hash Functions and RFID Tags: Mind the Gap," Proc. of the CHES08, V. 5154 of LNCS, p.283-299, 2008
  5. M. Feldhofer, etal, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the CHES04, V.3156, p.85-140, 2004
  6. Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Transaction on Network and Service Management, v.6, n.3, Sep, p.190-1205, 2009 https://doi.org/10.1109/TNSM.2009.03.090305
  7. H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, Vol. 4, No. 4, 2007, pp.337-340. https://doi.org/10.1109/TDSC.2007.70226
  8. Faouzi Kamoun. "RFID System Management: State-of-the Art and Open Research Issues" IEEE Transactions on Network and Service Management, V.6, N. 3, pp.190-205, Sep. 2009 https://doi.org/10.1109/TNSM.2009.03.090305

Cited by

  1. 강력한 패스워드 상호인증 프로토콜 취약점 분석 vol.15, pp.5, 2011, https://doi.org/10.12673/jant.2011.15.5.722