Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value

被引:94
作者
Cho, Jung-Sik [1 ]
Yeo, Sang-Soo [2 ]
Kim, Sung Kwon [1 ]
机构
[1] Chung Ang Univ, Div Comp Sci & Engn, Seoul 156756, South Korea
[2] Mokwon Univ, Div Comp Engn, Seoul, South Korea
关键词
RFID; Privacy; Forgery; RFID tag authentication; Brute-force attack; PRIVACY;
D O I
10.1016/j.comcom.2010.02.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency IDentification (RFID) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:391 / 397
页数:7
相关论文
共 21 条
[1]  
[Anonymous], 2008, EPC radio-frequency identity protocols generation-2 UHF RFID
[2]  
[Anonymous], RFID PRIV WORKSH NOV
[3]  
CHEN YC, 2007, P 9 INT C ADV COMM T, P255, DOI DOI 10.1109/ICACT.2007.358350
[4]  
Cho JS, 2007, PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, P481
[5]   Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications [J].
Devadas, Srinivas ;
Suh, Edward ;
Paral, Sid ;
Sowell, Richard ;
Ziola, Tom ;
Khandelwal, Vivek .
2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, :58-+
[6]  
DIMITRIOU T, 2005, C SEC PRIV EM AR COM
[7]  
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[8]   An authentication protocol in a security layer for RFID smart tags [J].
Feldhofer, M .
MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, :759-762
[9]  
Finkenzeller K., 2002, RFID handbook
[10]  
Gao XX, 2004, PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, P164