A Forward Secure RFID Privacy Protection Scheme with Two-Way Authentication

Article Preview

Abstract:

RFID has become an important infrastructure technology. However, it does not solve information security problem. An adversary can eavesdrop on the messages exchanged between tag and backend database and track tag’s holder. Many scholars have proposed some lightweight protocols in order to protect user’s privacy and avoid various attacks. In this paper, we analyze some authentication protocols. Especially, we analyze a forward secure RFID privacy protection scheme proposed by Ohkubo et al. Afterwards, we propose an improved protection scheme with two-way authentication. It is lightweight and suitable for low-cost RFID system. Moreover, it not only provides indistinguishability and forward security but also provides two-way authentication.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2262-2266

Citation:

Online since:

August 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. E. Sarma, S. A. Weis, and D. W. Engels, RFID systems and security and privacy implications, Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Lectures Notes in Computer Science. Berlin, vol. 2523, 2003, pp.454-469.

DOI: 10.1007/3-540-36400-5_33

Google Scholar

[2] S. E. Sarma, S. A. Weis, and D. W. Engels, Radio-frequency identification: secure risks and challenges, RSA Laboratories Cryptobytes, 2003, pp.2-9.

Google Scholar

[3] S. A. Weis , S. E. Sarma , R. L. Rivest , D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems, Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science. Berlin, vol. 2802, 2004, pp.201-212.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[4] Yong Ki Lee, Ingrid Verbauwhede. Secure and Low-cost RFID Authentication Protocols, Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks, (2005).

Google Scholar

[5] Eun Young Choi, Su Mi Lee, Dong Hong Lee. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment, Embedded and Ubiquitous Computing, vol. 3832, 2005, pp.945-954.

DOI: 10.1007/11596042_97

Google Scholar

[6] JeaCheol Ha, SangJae Moon, Juan Manuel Gonzalez Nieto, Colin Boyd, Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol, Emerging Technologies in Knowledge Discovery and Data Mining, vol. 4819, 2007, pp.574-583.

DOI: 10.1007/978-3-540-77018-3_57

Google Scholar

[7] Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, Cryptographic Approach to a Privacy Friendly Tag, RFID Privacy Workshop@MIT, (2003).

Google Scholar