Security and privacy on authentication protocol for low-cost radio frequency identification저가의 RFID를 위한 인증프로토콜의 보안 및 프라이버시에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 455
  • Download : 0
In the near future, radio frequency identification (RFID) technology is expected to play an important role for object identification as a ubiquitous infrastructure. One of its main objectives is the next generation technology that is mainly used to identify massive objects and will be a substitution for the existing optical bar code system. On the other hand, low-cost RFID tags are highly resource-constrained, cannot support its long-term security and it is very restricted to implement the existing cryptographic algorithms. Thus, they have potential risks and may violate privacy for their bearers, and user privacy issues would be a big barrier for the admirable usage of RFID in the future ubiquitous society. As far as user privacy issues concerned, we should consider the data leakage illegally from a tag and the malicious tracking for the unique ID of a tag. Due to the characteristics of RFID interface, the identification data from RFID tags must guarantee their integrity with other entities, readers or backend servers. In addition to it, these entities must trust each other, be seamlessly integrated with their authentication messages, and anonymously interact protecting user location privacy without revealing any information of tag bearers. To protect user privacy and remove security vulnerabilities, we propose a robust and privacy preserving mutual authentication protocol that fits the low-cost RFlD environment. Different from the previous works, our protocol firstly provides reader authentication and prevent active attacks based on the assumption that a reader is no more a trusted third party and the communication channel between the reader and the back-end server is insecure like wireless channel. In addition, the proposed protocol exhibits forgery resistance against simple copy, or counterfeiting prevailing RFID tags. As tags only have hash function and exclusive-or operation, the proposed protocol is very feasible for low-cost RFID system compared t...
Advisors
Kim, Kwang-Joresearcher김광조researcher
Description
한국정보통신대학교 : 공학부,
Publisher
한국정보통신대학교
Issue Date
2005
Identifier
392506/225023 / 020034548
Language
eng
Description

학위논문(석사) - 한국정보통신대학교 : 공학부, 2005, [ ix, 60 p. ]

Keywords

reader; tag; RFID; Security; back-end server; 인증 프로토콜; 백-앤드 서버; 리더; 태그; 보안; authentication protocol

URI
http://hdl.handle.net/10203/55356
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392506&flag=dissertation
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0