Applying HMAC to Enhance Information Security for Mobile Reader RFID System

This study proposed a data protection framework to enhance information security for mobile reader RFID system. HMAC scheme was integrated to communication protocol between tag and reader under considering the security requirements, limited computation capability and memory space in passive RFID system. The system life cycle comprised initial, maintain and revoke phases. Then the security is analyzed and prototype is developed. The results demonstrate that the proposed approach meets the system security requirement and suits for mobile reader RFID system.

[1]  Bernard Eydt,et al.  Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .

[2]  Athanasios T. Karygiannis,et al.  SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems , 2007 .

[3]  David Taniar,et al.  Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I , 2006, ICCSA.

[4]  Jian Huang,et al.  An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[5]  Ding Zhen-hua,et al.  A taxonomy model of RFID security threats , 2008, 2008 11th IEEE International Conference on Communication Technology.

[6]  Soo-Young Kang,et al.  A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiquitous , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[7]  Andrew S. Tanenbaum,et al.  The evolution of RFID security , 2006, IEEE Pervasive Computing.

[8]  Ming-Chang Tsai,et al.  Design and implementation of a RFID-based power meter and outage recording system , 2008, 2008 IEEE International Conference on Sustainable Energy Technologies.

[9]  Tzong-Dar Wu,et al.  Information security on RFID based power meter system , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[10]  Hung-Yu Chien,et al.  Secure Access Control Schemes for RFID Systems with Anonymity , 2006, 7th International Conference on Mobile Data Management (MDM'06).

[11]  Vidyasagar Potdar,et al.  A Critical Analysis of RFID Security Protocols , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[12]  C. Wieser,et al.  An Enumeration of RFID Related Threats , 2008, 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[13]  Jia Zhai,et al.  Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure , 2006, ICCSA.

[14]  Mei-Yu Wu,et al.  Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[15]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.