RFID-Based, Anonymous Authentication Scheme

Low cost Radio Frequency Identification (RFID) like EPC Gen 2 is one kind of most popular RFIDs in the market. However, as studied by several researchers, Gen 2 is not secure. Therefore, many researchers have devoted to improving the security. However, in addition to the fact the security of these improved schemes are still questionable, these solutions inevitably increase the cost of tags and inevitably modify the standards, which cannot help those existing low-cost RFID industry and market. In this paper, we explore secure applications of low cost RFID like Gen 2 by thoroughly examine the security properties of Gen 2 RFID, and then propose an interesting and secure application of low cost RFID.

[1]  Kwangjo Kim,et al.  RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .

[2]  Jaemin Park,et al.  A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag , 2007, Future Generation Communication and Networking (FGCN 2007).

[3]  J. Mitsugi,et al.  A Tamper Detection Method for RFID Tag Data , 2008, 2008 IEEE International Conference on RFID.

[4]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[5]  Dong Hoon Lee,et al.  Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems , 2006, OTM Workshops.

[6]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[7]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[8]  Kwangjo Kim,et al.  Mutual Authentication Protocol for Low-cost RFID , 2005, CRYPTO 2005.

[9]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[10]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[11]  Hung-Yu Chien,et al.  A Lightweight RFID Protocol Using Substring , 2007, EUC.

[12]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[13]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[14]  T. Sejnowski,et al.  RFID authentication protocol for low-cost tags , 2001 .

[15]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.