Security Problems in an RFID System

This paper focuses on the security and privacy threats being faced by the low-cost RFID communication system, the most challenging of which relate to eavesdropping, impersonation, and tag cloning problems. The security issues can be improved and solved by utilizing both prevention and detection strategies. Prevention technique is needed since it offers resistance capabilities toward eavesdroppers and impersonators. Detection technique is vital to minimize the negative effects of tag cloning threats. This paper proposes the use of both prevention and detection techniques to make RFID communication more secure. Lightweight cryptographic algorithm, which conforms to the EPC Class-1 Generation-2 standard, is used in the proposed mutual authentication protocol for RFID system to raise security levels. In addition, electronic fingerprinting system is deployed in the proposed solution as a detection method to distinguish counterfeit and legitimate tags.

[1]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[2]  Chin-Ling Chen,et al.  Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..

[3]  Aikaterini Mitrokotsa,et al.  Classification of RFID Attacks , 2008, IWRT.

[4]  Chao Yang,et al.  A Research on Issues Related to RFID Security and Privacy , 2007, I3E.

[5]  Tadayoshi Kohno,et al.  EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond , 2008 .

[6]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[7]  Hung-Yu Chien,et al.  A Lightweight Authentication Protocol for Low-Cost RFID , 2010, J. Signal Process. Syst..

[8]  Ari Juels,et al.  Shoehorning Security into the EPC Tag Standard , 2006, SCN.

[9]  Sang Ho Lee,et al.  Security and Privacy on Authentication Protocol for Low-cost RFID , 2006, 2006 International Conference on Computational Intelligence and Security.

[10]  Mike Burmester,et al.  A Flyweight RFID Authentication Protocol , 2009, IACR Cryptol. ePrint Arch..

[11]  Florian Michahelles,et al.  Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.

[12]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.

[13]  Dong Hoon Lee,et al.  Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.

[14]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.