State of the Art on Secure and Low Cost RFID Authentication Protocols for RFID Based Vehicle License Plate

Abstract RFID technology has many potential applications that would ease object identification seamlessly. One of its potential benefits to government is the adoption of RFID tag as embedded smart material within vehicle license plate. However, adoption of RFID in vehicle license plate is fragile from various RFID attacks while efforts to improve its security will lead to additional cost. Enhancing RFID security without extra cost poses new challenges to researchers in the area. This study aims to provide a state of the art on RFID authentication protocols under low cost restriction as a foundation for decision maker for further development stage of RFID based vehicle license plate. In depth analysis is performed by assessing the protocols according to three features namely data protection, tracking prevention, and forward security. Finally, it is concluded that the protocols are vary in satisfying three aspects of security features.

[1]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[2]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[3]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[4]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[5]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[6]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[7]  Roy Want,et al.  Enabling ubiquitous sensing with RFID , 2004, Computer.

[8]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[9]  Dongho Won,et al.  Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.

[10]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[11]  Philippe Oechslin,et al.  RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.

[12]  Dong Hoon Lee,et al.  Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.

[13]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[14]  Kwangjo Kim,et al.  RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .

[15]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[16]  Pedro Peris-López,et al.  LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .

[17]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[18]  Robert J. Kauffman,et al.  Making the ‘MOST’ out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID , 2007, Inf. Technol. Manag..

[19]  Soo-Young Kang,et al.  A Study on Low-Cost RFID System Management with Mutual Authentication Scheme in Ubiquitous , 2007, APNOMS.

[20]  Bo Sheng,et al.  Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[21]  Seung-Ho Shin,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2007, J. Inform. and Commun. Convergence Engineering.

[22]  Tharam S. Dillon,et al.  Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database , 2007, MSN.

[23]  Song Han,et al.  Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor , 2007, ICCSA.

[24]  Marc Langheinrich,et al.  Practical Minimalist Cryptography for RFID Privacy , 2007, IEEE Systems Journal.

[25]  Robert H. Deng,et al.  Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols , 2008, J. Softw..

[26]  Milad Alemzadeh,et al.  Human-Computer Interaction: Overview on State of the Art , 2008 .

[27]  Sachin Bhardwaj,et al.  UHF RFID METAL TAG APPLYING TO LICENSE PLATE USING METAL SHIELDING AND WATERTIGHT METHODS , 2009 .

[28]  Eman Shaaban,et al.  Lightweight Mutual Authentication Protocol for Low Cost RFID Tags , 2010, ArXiv.

[29]  Jaume Segura,et al.  Low Cost Identification Applications in Traffic Vehicular Environments , 2010 .

[30]  Min-Shiang Hwang,et al.  A Mutual Authentication Protocol for RFID , 2011, IT Professional.

[31]  Maria Grazia Gnoni,et al.  RFID technology for an intelligent public transport network management , 2012, Int. J. RF Technol. Res. Appl..

[32]  Lauri Sydanheimo,et al.  PASSIVE UHF RFID STRAIN SENSOR TAG FOR DETECTING LIMB MOVEMENT , 2012 .

[33]  Hong Yang,et al.  An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags , 2012 .

[34]  Song Han,et al.  A survey on low-cost RFID authentication protocols , 2012, 2012 International Conference on Advanced Computer Science and Information Systems (ICACSIS).