Abstract
The Radio Frequency Identification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called RFID tag. Even though RFID system is widely used for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect the users from tracing and also to support Low-cost RFID, we propose an authentication protocol which can be adopted for read-only RFID tag using XOR computation and Partial ID concept. The proposed protocol is secure against reply attacking, eavesdropping, and spoofing attacking so that avoiding the location privacy exposure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Molnar, D., Soppera, A., Wagner, D.: A scalable delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: Preneel, B., Tavares, S. (eds.) Selected Areas in Cryptography-SAC 2005. LNCS, Springer, Heidelberg (2005)
Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio- Frequency Identification Devices using Varying Identifiers. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshop, PERCOMW 2004, pp. 149–153. IEEE Computer Society Press, Los Alamitos (2004)
UHF wireless tag, Auto-ID Center, http://www.autoidcenter.org/research/mit-autoid-tr007.pdf
Ohkubo, M., Suzuki, K., Kinoshita, S.: A Cryptographic Approach to ’Privacy-Friendly’ tag, RFID Privacy Workshop (November 2003)
Yoshida, J.: RFID Backlash Prompts ’Kill’ Feature, EETimes (April 28, 2003)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)
Choi, E.Y., Lee, S.M., Lee, D.H.: Efficient RFID Authentication protocol for Ubiquitous Computing Environment. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) International Workshop on Security in Ubiquitous Computing Systems - secubiq 2005. LNCS, vol. 3823, pp. 945–954. Springer, Heidelberg (2005)
Avoine, G.: Radio frequency identification: adversary model and attacks on existing protocols, Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland (September 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, YZ., Cho, YB., Um, NK., Lee, SH. (2007). Security and Privacy on Authentication Protocol for Low-Cost RFID. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_82
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_82
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)