원문정보
초록
영어
Radio Frequency Identification (RFID) tags, due to their ability to uniquely identify every individual item and low cost, are well suited for supply chain management and are expected to replace barcodes in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed to be scanned, subjecting them to unauthorized scanning by malicious readers and to various other attacks, including cloning attacks. Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure and maintain low communication cost are still needed and being investigated. Recently, Cho et al. proposed a hash-based RFID mutual authentication protocol using a secret value. However, this paper shows that Cho et al.’s protocol is weak against desynchronization attack and proposes a remedy mutual authentication protocol, which offers a high level of security based on hash operation with synchronized secret. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication and untraceability as well as resistance to replay, denial-of-service and man-in-the-middle attacks, while retaining a competitive computation cost.
목차
1. Introduction
2. Adversarial Model and Security Requirements
2.1. Adversarial Model
2.2. Security Requirements
3. Review of Cho et al.’s Mutual Authentication Protocol
3.1. Cho et al.’s Mutual Authentication Protocol
3.2. Desynchronization Attach in Cho et al.’s Mutual Authentication Protocol
4. RFID Mutual Authentication Protocol
5. Security and Performance Analyses
5.1. Security Analysis
5.2. Performance Analysis
6. Conclusion
Acknowledgements
References