A Low-cost RFID Authentication Protocol with Location Privacy Protection

RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, location privacy problem is the most important issue that should be solved. In this paper, we propose a RFID authentication scheme that achieves the goal of location privacy. We also cite the threat model to analysis security threat of our protocol. Moreover, our scheme can be implemented with low-cost and high efficiency.

[1]  Tsuyoshi Takagi,et al.  An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.

[2]  Hun-wook Kim,et al.  Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security , 2006, 2006 International Conference on Hybrid Information Technology.

[3]  Gerhard P. Hancke Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[4]  Wenfei Fan,et al.  Keys with Upward Wildcards for XML , 2001, DEXA.

[5]  Dongho Won,et al.  A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone , 2006, 2006 IEEE International Symposium on Consumer Electronics.

[6]  C. Wieser,et al.  An Enumeration of RFID Related Threats , 2008, 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[7]  Kwangjo Kim,et al.  Security and Privacy on Authentication Protocol for Low-cost RFID , 2005 .

[8]  Howon Kim,et al.  Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems , 2006, 2006 IEEE International Symposium on Consumer Electronics.

[9]  Jaecheol Ryou,et al.  Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags , 2004, EUC.

[10]  Sozo Inoue,et al.  Toward the Digitally Named World with Security and Convenience Using RFID Tags , 2002 .

[11]  九州大学大学院システム情報科学研究科,et al.  Research reports on information science and electrical engineering of Kyushu University , 1996 .

[12]  Jianhua Ma,et al.  A Random ID Update Scheme to Protect Location Privacy in RFID-Based Student Administration Systems , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[13]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[14]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.