DOI QR코드

DOI QR Code

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party

신뢰받는 제3자 기반의 RFID 태그 소유권 이전 프로토콜

  • Kim, Young-Sik (Chosun University, Department of Information and Communication Engineering)
  • Received : 2014.12.03
  • Accepted : 2015.03.16
  • Published : 2015.03.31

Abstract

Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.

최근 RFID는 수년 동안 재고관리, 물류 등 다양한 분야에 널리 활용되고 있을 뿐만 아니라 사물인터넷의 중요구성 요소로 진화하고 있다. RFID의 활용분야가 증가함에 따라 RFID를 위한 보안 및 프라이버시 기술들에 대한 연구가 다양하게 이루어져 왔고, 그 중에서 RFID가 내장된 제품의 구매시 필요한 RFID의 소유권 이전을 위한 보안 프로토콜에 대한 연구도 활발하게 제안되어 왔다. 최근에 Kapoor와 Piramuthu는 기존에 제안된 소유권 이전 프로토콜들이 갖고 있던 보안상의 문제점을 해결한 단일 RFID 태그의 소유권을 이전하는 새로운 프로토콜을 제안하였다. 이 논문에서는 Kapoor-Piramuthu의 프로토콜 역시 보안상의 문제를 갖고 있음을 보이며, 이 문제를 해결한 새로운 프로토콜을 제안한다. 보안 분석을 통해 새로 제안한 프로토콜은 기존 프로토콜의 문제를 해결하였음을 보였다.

Keywords

References

  1. S. Dominikus and J.-M. Schmidt, "Connecting passive RFID tags to the internet of things," in Proc. Interconnecting Smart Objects with the Internet Workshop, Prague, 2011.
  2. W. S. Choi, S. S. Kim, Y. H. Kim, T. J. Yoon, K. W. Ahn, and K. J. Han, "Design of PUF-based encryption processor and mutual authentication protocol for low-cost RFID authentication," J. KICS, vol. 39, no. 12, pp. 831-841, Dec. 2014.
  3. J. S. Kim, J. K. Park, and Y. T. Shin, "RFID-based automatic inspection system design and implementation for manufacturing and retail industry," J. KICS, vol. 39, no. 1, pp. 97-105, Jan. 2014.
  4. S. J. Oh, C. H. Lee, T. J. Yoon, K. H. Chung, and K. S. Ahn, "Improved authentication protocol for privacy protection in RFID systems," J. KICS, vol. 38, no. 1, pp. 12-18, Jan. 2013.
  5. D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," in Workshop on RFID Security and Light-Weight Crypto., Jul. 2005.
  6. J. Saito, K. Imamoto, and K. Sakurai, "Reassignment scheme of an RFID tag's key for owner transfer," in Proc. EUC Workshops, vol. 3823 LNCS, pp. 1303-1312, 2005.
  7. G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Systems, Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012. https://doi.org/10.1109/TSMCC.2010.2091501
  8. G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011. https://doi.org/10.1016/j.dss.2011.08.002
  9. H. Lei and T. Cao, "RFID protocol enabling ownership transfer to protect against traceability and dos attacks," in Proc. 1st Int. Symp. Data, Privcacy E-Commerce, pp. 508-510, 2007.
  10. G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Syst., Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012. https://doi.org/10.1109/TSMCC.2010.2091501
  11. G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011. https://doi.org/10.1016/j.dss.2011.08.002
  12. G. Kapoor and S. Piramuthu, "Vulnerabilities ini some recently proposed RFID ownership transfer protocols," in Proc. NetCoM'09, pp. 354-357, 2009.