DOI QR코드

DOI QR Code

An analysis of effectiveness and safety about matrix-based RFID authentication protocol

행렬기반 RFID 인증 프로토콜의 효율성 및 안정성 분석

  • Received : 2013.12.30
  • Accepted : 2014.02.20
  • Published : 2014.02.28

Abstract

RFID system is used in several fields such as traffic and access control. The study about RFID security is actively progressed as security threat has been increased. This paper suggests matrix-based authentication protocol. And we analyze the safety of authentication protocol and compares the effectiveness of the protocol with other authentication protocols. The suggested authentication protocol secures from wiretapping attack, replay attack, and spoofing attack, and reduces overload of back-end database so that has efficient performance.

RFID 시스템은 교통, 출입통제 비롯한 여러 분야에서 활용되고 있다. RFID 시스템에 대한 보안위협 또한 증가하여 정보보안에 대한 연구가 진행되고 있다. 본 논문에서는 행렬기반 RFID 인증 프로토콜을 제안하고 기존에 제안된 프로토콜과 효율성을 비교하고 안전성을 분석한다. 제안된 인증 프로토콜은 도청, 재전송 등의 공격에 안전하며, 서버의 계산량을 줄여 성능면에서 효율이 우수한 장점을 갖는다.

Keywords

References

  1. A. Jules, R. L. Rivest, and M. Szydlo " Selective Blocking of RFID Tags for Consumer Privacy", In Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp.103-111, 2003
  2. H. Gillbert, M. Robshaw, H. Sibent, "Active attack against HB+: a probably secure lightweight authentication protocol", Electronics Letters, 13th October, vol. 41, No. 25, 2005.
  3. S. L. Garfinkel, A. Jules and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions", IEEE Security and Privacy, vol. 3, pp.34-43, May/June 2005.
  4. Hyoyoung Shin, Kyedong Jung, Chigon Hwang, "A Study on the effectiveness of matrix-based authentication protocol", The 3rd International conference of convergence technology 2013, July 3-6, 2013.
  5. R. Chandramouli, T. Grance, R. Kuhn, "Security Standards for the RFID Market ", IEEE Security & Privacy, Dec. 2005.
  6. Christian Flockermeier, Sanjay Samara, "An Overview of RFID System Interfaces and Reader Protocols", 2008 IEEE International Conference on RFID, pp.232-pp.240, April, 2008
  7. Su Youn Lee, Hyo Beom Ahn, "A Study on Secure Matrix-based RFID Authentication Protocol", Journal of information and security. Vol. 6, No.1, pp.83-90, 2006.
  8. Eun-Jun Yoon, Kyeoung-Ju Ha, Kee-Young Yoo, "Robust Matrix-based RFID Mutual Authentication Protocol", The Journal Of Korea Information And Communications Society, Vol. 33, No. 11, 2008.
  9. Ik-Su Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System", The Journal Of Korea Information And Communications Society, Vol. 34, No. 4, pp.428-434, 2009.
  10. Eun Young Choi, Dong Hee Choi, Jong In Lim, Dong Hoon Lee, "Efficient authenticate protocol for very Low-Cost RFID", Journal of the Korea Institute of Information Security and Cryptology, Vol. 15, No. 5, 2005.