DOI QR코드

DOI QR Code

Efficient authenticate protocol for very Low-Cost RFID

저가형 RFID 시스템을 위한 효율적인 인증 프로토콜

  • Published : 2005.10.01

Abstract

A RFID (Radio Frequency Identification) system receives attention as the technology which can realize the ubiquitous computing environment. However, the feature of the RFID tags may bring about new threats to the security and privacy of individuals. Recently, Juels proposed the minimalist cryptography for very low-cost RFID tags, which is secure. but only under the impractical assumption such that an adversary is allowed to eavesdrop only the pre-defined number of sessions. In this paper, we propose a scheme to protect privacy for very low-cost RFID systems. The proposed protocol uses only bit-wise operations without my costly cryptographic function such as hashing, encryption which is secure which is secure against an adversary who is allowed to eavesdrop transmitted message in every session any impractical assumption. The proposed scheme also is more efficient since our scheme requires less datas as well as few number of computations than Juels's scheme.

무선 주파수 인식 (RFID: Radio Frequency Identification) 시스템은 유비쿼터스 컴퓨팅 환경에서 중요한 기술로 주목 받고 있으나 RFID 시스템이 가지고 있는 특성으로 인하여 시스템의 보안과 프라이버시 침해가 대두되면서 이를 해결하기 위해 많은 프로토콜들이 제안되었다. 최근, Juels은 저가형의 RFID 태그를 위한 최소한의 암호화 기법을 사용하는 안전한 프로토콜을 제안하였다. 그러나 제안된 프로토콜의 안전성은 공격자가 미리 정해진 세션만을 도청할 수 있다는 가정에 기반하고 있다. 본 논문에서는 저가의 RFID 태그를 위한 프라이버시를 보호하는 안전하고 효율적인 기법을 제안한다. 제안하는 프로토콜은 해쉬, 암호화 알고리즘과 같은 암호화 기법을 사용하지 않으며 단지 단순한 비트 연산을 사용하며, 리더와 태그 사이의 모든 통신을 도청할 수 있는 공격자에 대해 안전하며, Juels가 제안한 기법보다 적은 연산량과 데이터를 요구하기 때문에 더 효율적이다.

Keywords

References

  1. Auto-ID Center, '860Mhz-960MHz Class I Radio Frequency Identification Tag Radio Frequency and Logical communication Interface Specification Proposed Recommendation Version 1.0.0. Technical Report MIT-AUTOID-TR-007', AutoID Center, MIT, 2002
  2. G. Avoine and Ph. Ocehslin, 'A Scalable and Provably Secure Hash-Based RFID Protocol', The 2nd IEEE International Workshop on Pervasive Computing and Communication Security-PerSec 2005, IEEE Computer Society Press, Kauai Island, Hawaii, USA, 3, 2005
  3. A. Juels. 'Minimalist cryptography for Low-Cost RFID Tags', In The Fourth Internationl Conferecne on Security in Communication Networks- SCN 2004, vol. 3352 LNCS, pp. 149-164, Springer-Verlag. 2004
  4. A. Juels and R. Pappu. 'Squealing euros : Privacy protection in RFID- enabled banknotes', In proceedings of Financial Cryptography - FC'03, vol. 2742 LNCS, pp.103-121, Springer-Verlag, 2003
  5. EPCglobal. 'EPCTM Tag Data Standards Version 1.1 Rev.1.24 Standard Specification 01', 04, 2004
  6. A. Juels, R. L. Rivest and M. Szudlo. 'The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy'. In the 8th ACM Conference on Computer and Communications Security, pp. 103-111, ACM Press. 2003
  7. S. Junichiro, R. Jae-Cheol and S. Kouichi, 'Enhancing privacy of Universal Re-encryption scheme for RFID Tags', EUC 2004, Vol. 3207 LNCS, pp.879-890, Springer-Verlag, 12, 2004
  8. D. Henrici and Paul Muller. 'Hash- based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers'. PerSec'04 at IEEE PerCom. pp. 149-153, 2004
  9. L. Su Mi, H. Young Ju, L. Dong Hoon and L. Jong In. Efficient uthentication for Low-Cost RFID systems. ICCSA05, vol. 3480 LNCS, pp.619-629, May 2005
  10. Keunwoo Rhee, Jin Kwak, Seungjoo Kim and Dongho Won, 'Challenge- Response based secure RFID Authentication Protocol for Distributed Database Environment', SPC2005, Vol. 3450 LNCS, pp.70-84, Springer-Verlag, 4, 2005
  11. M. Ohkubo, K. Suxuki and S. Kinoshita. 'Efficient Hash-Chain Based RFID Privacy Protection Scheme', Ubcomp2004 workshop
  12. S. E. Sarma. 'Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center', 2001. Abailable from http://www.autoidcenter. org
  13. S. E. Sarma, S. A. Weis and D. W. Engels. 'Radio-frequency identification systems'. CHES'02, vol.2523 LNCS, pp.454-469, Springer-Verlag, 2002
  14. S. E. Sarma, S. A. Weis and D. W. Engels. 'RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014', AutoID Center, MIT, 2002
  15. 유성호, 김기현, 황용호, 이필중, '상태 기반 RFID 인증 기법 프로토콜', 정보보호학회논문지, 제 4권, 6호, 12, 2004
  16. S. A. Weis, S. E. Sarma, S. A. Weis and D. W. Engels. 'Security and privacy Aspects of Low-Cost Radio Frequency Identification Systems'. First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/sweis/spc-rfid.pdf