A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments

유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법

  • 서대희 (이화여자대학교 컴퓨터공학과) ;
  • 백장미 (순천향대학교 컴퓨터공학부) ;
  • 조동섭 (이화여자대학교 컴퓨터공학과)
  • Published : 2009.08.15

Abstract

RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

센서 네트워크 기술로서 스마트 태그 기술을 이용한 RFID 기술이 최근 각광을 받고 있다. 그러나 누구든지 태그 정보를 쉽게 읽어 볼 수 있는 점, 태그와 리더기 간의 상호 인증 문제, 저렴한 가격의 스마트 태그 구현을 위하여 보안적인 구현의 커다란 제약이 존재하는 등 유비쿼터스 컴퓨팅 환경에서 적용하기엔 여전히 문제점들이 발생되고 있다. 따라서 제안방식은 사용자 주변의 신뢰된 RFID 태그를 기반으로 RF 네트워크에서 요구되는 다양한 서비스와 관련된 보안과 효율성을 향상시키기 위해 기존 논문에서 인증만을 위해 사용하던 수동형 RFID 태그를 이용해 임시 그룹을 설정하여 동적인 환경에 다양한 서비스를 제공하기에 적합한 관리 방식을 제안하였다. 또한 RFID 관리 방식에서 RFID 그룹화, 서비스별 임시 그룹 설정, 보안 서비스를 제공하며, 통신의 효율성을 향상 시켰다.

Keywords

References

  1. Avoine G., and Oechslin P., "RFID Traceability: A Multilayer Problem," Financial Cryptography - FC'05, LNCS, Springer, 2005
  2. RFID Journal. Gillette to Purchase 500 Million EPC Tags, http://www.Iiidjournal.com
  3. Bono, S., Green, M,., Stubblefield, A., Julels, A., Rubin, A., and Szydlo, M., "Security Analysis of a Cryptographically-Enabled RFID Device," In USENIX Security, 2005. (Available at http://rfidanalysis.org/.)
  4. Castro, Miguel and Barbara Liskov, "Practical Byzantine Fault Tolerance," Operating Systems Design and Implementation, 1999, (http://www.pmg.lcs.mit.edu/~castro/osdi99_html/osdi99.html)
  5. Junichiro S., Jae-Cheol R and Kouichi S., "Enhancing privacy of Universal Reencryption scheme for RFID Tags," EUC 2004, vol.3207 LNCS, pp.879-890, Dec. 2004
  6. MIT Auto-ID Center. http://www.autoidcenter.org
  7. Su-Mi L., Young-Ju H., Dong-Hoon L., and Jong L., "Efficient Authentication for Low-Cost RFID systems," ICCSA05, vol.3480 LCNS, pp.619-629, May 2005
  8. Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/sweis/spcIiid.pdf
  9. Dimitriou T., "A lightweight Iiid protocol to protect against traceability and cloning attacks," IEEE, SECURECOMM, 2005
  10. Gilbert, H., Sibert, H., and Robshaw, M., "An Active Attack Against a Provably Secure Lightweignt Authentication Protocol," Preliminary Version, 2005
  11. Hung-Yu Chien and Che-Hao Chen, "Mutulaauthentication protocol for RFID conforming to EPC Class 1 Generation 2 Standards," Computer Standards & Interfaces, vol.29, pp.254-259, Feb., 2007 https://doi.org/10.1016/j.csi.2006.04.004
  12. Stephen A. Weis, "Security and Privacy in RadioFrequency Identification Devices," Masters Thesis. MIT. May, 2003
  13. Sanjay E.Sarma, "Towards the five-cent Tag," Technical Report MIT-AUTOID-WH006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org
  14. Juels A., "Minimalist cryptography for Low-Cost RFID Tag," In The Fourth International Conference on Security in Communication Networks-SCN 2004, vol.3352, LNCS, pp.149-164, Sep. 2004
  15. Juels A., "Authentication Pervasive Devices with Human Protocols," Crypto 2005, Aug. 205.
  16. Jeong-kyu Y., Ren K, and Kwan-gio K, "Security and Privacy on Authentication Protocol for Low-cost RFID," Symposium on Cryptography and Information Security, Jan., 2005
  17. Ohkubo M., Suzuki K, and Kinoshita S., "Cryptographic Approach to "Privacy-Friendly" Tag" RFID Privacy Workshop@MIT, Nov, 2003
  18. Bringer J, Chabanne H., and Dottax E., "HB++ : a Lightweight Authentication Protocol Secure Against Some Attacks," IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006
  19. Henrici D., and Paul M., "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," PerSee'04 at IEEE PerCom. pp.149-153, 2004
  20. Jules A., and Pappu R, Squealing E., "Privacy protection in RFID-enabled banknotes, In processing of Financial Cryptography," FC'03, vol.2742 LNCS, pp.103-121, Sep 2003
  21. D.N. Due, J. Park, H. Lee and K Kim, "Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning," The 2006 Symposium on Cryptography and Information Security, 2006
  22. Katz J., and Ji-Sun S., "Prallel and Concurrent Security of the HB and HB+ Protocols," Cryptology ePrint Archive: Report 2005/461 (to appear in the preceedings of Eurocrypt 2006)
  23. D-H, Seo, I-Y Lee, "A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment," Journal of the Korean Institute of Information Security and Criptology, vol.16, no.2, pp.81-94, 2006
  24. Kideok Cho, Sangheon Pack, Taekyoung Kwon, and Yanghee Choi, "SRMS: SIP-based RFID Management System," in Proc. IEEE International Conference on Pervasive Services (ICPS) 2007, Istanbul, Turkey, July 2007