DOI QR코드

DOI QR Code

An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID

해쉬된 태그ID와 대칭키 기반의 RFID 인증프로토콜

  • 박용수 (경북대학교 BK21) ;
  • 신주석 (경북대학교 전기전자컴퓨터공학부) ;
  • 최명실 (대구가톨릭대학교 기초학부) ;
  • 정경호 (경운대학교 컴퓨터공학과) ;
  • 안광선 (경운대학교 컴퓨터공학과)
  • Published : 2009.12.31

Abstract

By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tag's H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.

무선으로 대상물의 고유정보를 인식함으로 대상물을 관리할 수 있게 하는 RFID(Radio Frequency Identification)기술은 유비쿼터스 시대의 핵심기술이다. RFID에서 정보는 공간상에서 쉽게 노출될 수 있음으로 보안 및 프라이버시 문제가 항시 존재한다. 본 논문에서는 저가형 태그의 구현에 적합한 대칭키 기반의 상호인증 프로토콜을 제안한다. 제안한 프로토콜은 대칭키를 사용하여 하드웨어 자원을 최소화할 수 있으며, 해쉬 함수로 암호화한 태그 ID를 사용하고 PUF(Physically Unclonable Function)의 Challenge-Response값을 공유 대칭키로 활용하기 때문에 키 노출 위험이 없는 안전한 프로토콜이다.

Keywords

References

  1. Stepan A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Security in Pervasive Computing - SPC 2003, LNCS 2802, pp.201-212, 2004 https://doi.org/10.1007/978-3-540-39881-3_18
  2. Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita, “Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-cost RFID,” Proceedings of the SCIS 2004, pp.719-724, 2004
  3. Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, “Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment,” International Conference on Security in Pervasive Computing Environments, pp.70-84, 2005. Springer
  4. K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, Computational Intelligence and Security, 2006 International Conference on, Vol.2, No.1, 2006, pp.1090-1095 https://doi.org/10.1007/978-3-540-74377-4_81
  5. 류석, “공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구,” 정보처리학회논문지C Vol.13C, No.7, pp.837-842, 2006 https://doi.org/10.3745/KIPSTC.2006.13C.7.837
  6. 김창훈, “타원곡선 암호 시스템의 고속 구현을 위한 VLSI 구조,” 정보처리학회논문 C Vol.15C, No.2, pp.133-140, 2008 https://doi.org/10.3745/KIPSTC.2008.15-C.2.133
  7. M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. “Strong authentication for RFID systems using AES algorithm,” In Conference of Cryptographic Hardware and Embedded Systems, 2004. Proceedings, pp.357-370, Springer 2004
  8. M. Feldhofer and Christian Rechberger, “A Case against Currently Used Hash Functions in RFID Protocols,” OTM Workshops 2006, LNCS 4277, pp.372-381, 2006 https://doi.org/10.1007/11915034_61
  9. 구본석, 유권호, 양상운, 장태주, 이상진, “RFID 태그를 위한 초소형 AES 연산기의 구현”, 정보보호학회논문지, 제16권 제5호, pp.67-77, 2006
  10. Chae Hoon Lim and Tymur Korkishko, “mCrtton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors,” WISA 2005, LNCS 3786, pp.243-258, 2006 https://doi.org/10.1007/11604938_19
  11. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, and Seongtaek Chee, “HIGHT: A New Block Cipher Suitale for Low-Resource Device”, CHES 2006, LNCS 4249, pp. 46-59, 2006 https://doi.org/10.1007/11894063_4
  12. Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshow, Yannick Seurin, and C. Vikkelsoe, “HEIGHT: PRESENT: An Ultra-Lightweight Block Cipher”, CHES 2007, LNCS 4727, pp.450-466, 2007 https://doi.org/10.1007/978-3-540-74735-2_31
  13. B. Toiruul and KyungOh Lee, “An Advanced Mutual- Authentication Algorithn Using AES for RFID Systems”, IJCSNS International Journal of Computer Science and Network Security, Vol.6, No.9B, pp.156-162, September, 2006
  14. KLAUS FINKENZELLER, 'RFID Handbook: Fundamentals and Application in Contactless Smart Cards and Identification', 2nd EdD.,John Wiley & Sons, Ltd. 2003, pp.223.
  15. S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, “Design and Implementation of PUF-Based 'Unclonable' RFID ICs for Anti-Counterfeiting and Security Applications”, 2008 IEEE International Conference on RFID, 16-17 April, 2008, pp.58-64, Las Vegas, USA
  16. L. Bolotnyy and G. Robins, “Physically Unclonable Function-Based Security and Privacy in RFID Systems”, in Proc. IEEE International Conference on Pervasive Computing and Communications(PerCom 2007), pp.211-218, March, 2007 https://doi.org/10.1109/PERCOM.2007.26
  17. P.Tuyls and L. Batina, “RFID-Tags for Anti-Counterfeiting”, Topics in Cryptology-CT-RSA 2006, Vol.3860, pp. 115-131 https://doi.org/10.1007/11605805_8
  18. L. Kulseng, Z. Yu, Y. Wei and Y. Guan, “Lightweight Secure Search Protocols for Low-cost RFID Systems,” 2009 29th IEEE International Conference on Distributed Computing Systems, pp.40-48 https://doi.org/10.1109/ICDCS.2009.12
  19. L. Kulseng, “Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems,” A thesis for the degree of MASTER OF SCIENCE, Iowa State University, Ames, Iowa, 2009
  20. 최은영, 최동희, 임종인, 이동훈, “저가형 RFID 시스템을 위한 효율적인 인증 프로토콜,” 정보보호학회논문지 15권 5호, pp59-71, 2005
  21. D. Nguyen Duc, J. Park, H. Lee and K. Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,” Proc. of SCIS 2006, Abstracts pp.97, Jan. 17-20, 2006, Hiroshima, Japan
  22. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda, “LAMP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags,” in Proc. Second Workshop RFID Security, July 2006
  23. Ari Juels, “RFID Security and Privacy: A Research Survey,” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, Vol.24, No.2, Feb., 2006 https://doi.org/10.1109/JSAC.2005.861395
  24. Sandra Dominikus, Elisabeth Oswald, and Martin Feldhofer, “Symmetric Authentication for RFID Systems in Practice”, Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, Jul., 2005
  25. Sungbae Ji, “RFID-enabled Extensible Authentication Framework and Its Applications,” A thesis for the Degree of Master, ICU, 2008
  26. S. Kang, D. Lee, and I. Lee, “A study on secure RFID mutual authentication scheme in pervasive computing environment” Computer Communications 31, 2008, pp.4248-4254 https://doi.org/10.1016/j.comcom.2008.05.006