Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems 


Vol. 41,  No. 5, pp. 581-591, May  2016


PDF
  Abstract

RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Kim and D. Won, "Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 5, pp. 581-591, 2016. DOI: .

[ACM Style]

Jiye Kim and Dongho Won. 2016. Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems. The Journal of Korean Institute of Communications and Information Sciences, 41, 5, (2016), 581-591. DOI: .

[KICS Style]

Jiye Kim and Dongho Won, "Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 5, pp. 581-591, 5. 2016.