An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID

ABSTRACT By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tag's H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.Keywords:RFID, Symmetric Key, Hash Function, Authentication protocol, PUF 1. 서 론 1) 무선을 이용하여 대상물의 고유정보를 인식함으로, 대상물을 관리할 수 있게 하는 RFID( Radio Frequency Identification)기술은 유비쿼터스 시대의 핵심기술로써 각광을 받고 있다. 이 기술은 공간을 통하여 임의의 반경 내의 사물에 동시에 접근할 수 있는 전자파의 특성을 이용하기 때문에 대상물의 정렬 불필요, 빠른 재고 조사, 아이템별 추적 가능 및 다시 쓰기 가능 등 기존의 바코드 인식기술에 비하여 많은 장점으로 인하여 바코드 기술의 대체기술로 알려져 있다. 하지만 공간을 매개로한 전자파의 전달 특성은

[1]  Chang-Hoon Kim,et al.  VLSI Architecture for High Speed Implementation of Elliptic Curve Cryptographic Systems , 2008 .

[2]  Sandra Dominikus,et al.  Symmetric Authentication for RFID Systems in Practice , 2005 .

[3]  Pedro Peris-López,et al.  LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .

[4]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[5]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[6]  Chae Hoon Lim,et al.  mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors , 2005, WISA.

[7]  이동훈,et al.  저가형 RFID 시스템을 위한 효율적인 인증 프로토콜 , 2005 .

[8]  KyungOh Lee,et al.  An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems , 2006 .

[9]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[11]  Tsuyoshi Takagi,et al.  An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.

[12]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[13]  Dongho Won,et al.  Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.

[14]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[15]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[16]  Jongsung Kim,et al.  HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.

[17]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[18]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[19]  Soo-Young Kang,et al.  A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..

[20]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[21]  Sungbae Ji RFID-enabled Extensible Authentication Framework and Its Applications , 2008 .

[22]  Yong Guan,et al.  Lightweight Secure Search Protocols for Low-cost RFID Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[23]  Lars Skaar Kulseng Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems , 2009 .