A Secure Mutual Authentication Protocol for Low-cost RFID System
نویسندگان
چکیده
With extended data storage space and advanced wireless transmission capability, Radio Frequency IDentification (RFID) is rapidly deployed to replace barcode position in our daily lives and considered as the next generation identification technology in ubiquitous communication environment. The most important key factor of RFID technology is to enable systems with the ability to automatically identify labeled objects without the constraint of line of sight. RFID technology is a well known AIDC (Automatic Identification and Data Capture) technology to provide the benefits including contactless read, long transmission range and transaction time saving (Garfinkel & Rosenberg, 2005). Most of innovative applications designed for RFID system can be divided into following classes such as asset management, tracking, authenticity verification, matching, process control, access control, automated payment and supply chain management (Karygiannis et al., 2007). In spite that the adoption of RFID technology becomes popular in a board range of applications, the cost of a RFID tag is still too expensive to be fully adopted by logistic and retailer industries. Even though from the logistic and retailer industries point of view, to label RFID tags on all sale items is still cost-prohibitive under the current price of a passive RFID tag. Nevertheless, the convenience of RFID technology still has a great attraction for inventory management. For example, in 2005, Wal-Mart which is the biggest retailer in America declared a new policy to force its top 500 suppliers to adopt RFID technology for inventory management; otherwise, Wal-Mart will deny new transaction contracts from those who do not comply this new policy. Because of this policy, all top 500 suppliers start to apply RFID tags onto their merchandises by spending and absorbing extra RFID cost. In contrary, the introduction of RFID technology can provide great benefits for Wal-Mart to control logistic process accurately, replenish empty stock efficiently and lower space requirement for goods storage. Although the widespread use of RFID technology makes human life better than past, the security invasion and user privacy disclosure are still concerned by individuals and organizations. For example, in 2006, Metro AG which is the biggest supermarket chain store in Germany used the RFID technology to not only automatically manage production and stock but also help customers search their target items quickly. Metro AG gave VIP cards to the top 10% customers and based on the historical shopping behaviors of a VIP customer to recommend products nearby the customer’s current location. However, Metro AG did not notify VIP customers that the VIP card is embedded with RFID. Three months later, a VIP O pe n A cc es s D at ab as e w w w .in te ch w eb .o rg
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملA Hybrid Mutual Authentication Protocol for RFID
Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems employing low cost RFID tags remains an open problem. In this paper we develop and present a RFID security protocol which not only allows mutual authentication and secure transmission of data between the reader and tag b...
متن کاملA Strong RFID Mutual Authentication Protocol Based on a Lightweight Public-key Cryptosystem
RFID is a key technology that can be used to create the ubiquitous society. However, this technology may suffer from some serious threats such as privacy disclosure. In order to solve these secure problems we propose a strong mutual authentication protocol based on a lightweight public-key cryptosystem: NTRU. The protocol assures the confidentiality of the RFID system by encrypting the messages...
متن کاملLow Cost Countermeasure at Authentication Protocol Level against Electromagnetic Side Channel Attacks on RFID Tags
Radio Frequency Identification (RFID) technology is widely spread in many security applications. Producing secured low-cost and low-power RFID tags is a challenge. The used of lightweight encryption algorithms can be an economic solution for these RFID security applications. This article proposes low cost countermeasure to secure RFID tags against Electromagnetic Side Channel Attacks (EMA). Fir...
متن کاملMutual Authentication Protocol for Low-cost RFID
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security vulnerabilities, we propose a robust mutual auth...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009