A Secure Mutual Authentication Protocol for Low-Cost RFID System

作者: N.W. Lo , Tzu-Li Yang , Kuo-Hui Yeh

DOI: 10.5772/6529

关键词:

摘要: With extended data storage space and advanced wireless transmission capability, Radio Frequency IDentification (RFID) is rapidly deployed to replace barcode position in our daily lives considered as the next generation identification technology ubiquitous communication environment. The most important key factor of RFID enable systems with ability automatically identify labeled objects without constraint line sight. a well known AIDC (Automatic Identification Data Capture) provide benefits including contactless read, long range transaction time saving (Garfinkel & Rosenberg, 2005). Most innovative applications designed for system can be divided into following classes such asset management, tracking, authenticity verification, matching, process control, access automated payment supply chain management (Karygiannis et al., 2007). In spite that adoption becomes popular board applications, cost tag still too expensive fully adopted by logistic retailer industries. Even though from industries point view, label tags on all sale items cost-prohibitive under current price passive tag. Nevertheless, convenience has great attraction inventory management. For example, 2005, Wal-Mart which biggest America declared new policy force its top 500 suppliers adopt management; otherwise, will deny contracts those who do not comply this policy. Because policy, start apply onto their merchandises spending absorbing extra cost. contrary, introduction control accurately, replenish empty stock efficiently lower requirement goods storage. Although widespread use makes human life better than past, security invasion user privacy disclosure are concerned individuals organizations. 2006, Metro AG supermarket store Germany used only manage production but also help customers search target quickly. gave VIP cards 10% based historical shopping behaviors customer recommend products nearby customer’s location. However, did notify card embedded RFID. Three months later,

参考文章(25)
Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won, Challenge-eesponse based RFID authentication protocol for distributed database environment international workshop on security. ,vol. 3450, pp. 70- 84 ,(2005) , 10.1007/978-3-540-32004-3_9
Ticyan Li, Guilin Wang, Security analysis of two ultra-lightweight RFID authentication protocols information security conference. pp. 109- 120 ,(2007) , 10.1007/978-0-387-72367-9_10
A. Juels, D. Molnar, D. Wagner, Security and Privacy Issues in E-passports international workshop on security. pp. 74- 88 ,(2005) , 10.1109/SECURECOMM.2005.59
Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, Arturo Ribagorda, M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags Ubiquitous Intelligence and Computing. pp. 912- 923 ,(2006) , 10.1007/11833529_93
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm Lecture Notes in Computer Science. pp. 357- 370 ,(2004) , 10.1007/978-3-540-28632-5_26
Hung-Yu Chien, SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity IEEE Transactions on Dependable and Secure Computing. ,vol. 4, pp. 337- 340 ,(2007) , 10.1109/TDSC.2007.70226
Hung-Yu Chien, Che-Hao Chen, Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards Computer Standards & Interfaces. ,vol. 29, pp. 254- 259 ,(2007) , 10.1016/J.CSI.2006.04.004
Jeongkeun Lee, Taekyoung Kwon, Yanghee Choi, Sajal K Das, Kyung-ah Kim, None, Analysis of RFID anti-collision algorithms using smart antennas Proceedings of the 2nd international conference on Embedded networked sensor systems - SenSys '04. pp. 265- 266 ,(2004) , 10.1145/1031495.1031528
Sindhu Karthikeyan, Mikhail Nesterenko, RFID security without extensive cryptography Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05. pp. 63- 67 ,(2005) , 10.1145/1102219.1102229
Ari Juels, Strengthening EPC tags against cloning Proceedings of the 4th ACM workshop on Wireless security - WiSe '05. pp. 67- 76 ,(2005) , 10.1145/1080793.1080805