Abstract
The nature of data security vulnerability and location privacy invasion of RFID systems have become a serious problem after hundreds of RFID application systems deployed all over the world. One of the promising solution directions is to provide an efficient authentication scheme with the compliance of international RFID standards such as EPCglobal, ISO18000-1 and ISO18000-6. In this study, we propose a novel authentication scheme for RFID systems with excellent data security properties, robust location privacy preservation and efficient data matching/retrieval mechanism. In addition, our scheme is compatible to EPCglobal Class-1 Generation-2 RFID standards because only simple cryptographic primitives such as pseudo-random number generator and cyclic redundancy check are required to be implemented in RFID tags.
Chapter PDF
Similar content being viewed by others
References
Chien, H.-Y., Chen, C.-H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computer Standards & Interfaces 29(2), 254–259 (2007)
Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: PerSec 2004. Workshop on Pervasive Computing and Communications Security at IEEE PerCom 2004, Orlando, Florida, USA PERCOMW (March 14-17, 2004)
EPCglobal, http://www.EPCglobalinc.org/
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Security in Pervasive Computing, pp. 201–212 (2003)
Garfinkel, S.L., Juels, A., Pappu, R.: RFID Privacy: An overview of Problems and Proposed Solutions. IEEE Security & Privacy Magazine 3(3), 34–43 (2005)
Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing Security of EPCglobal GEN-2 RFID Tag against Traceability and Cloning. In: The 2006 Symposium on Cryptography and Information Security, Hiroshima, Japan (January 17-20, 2006)
Karthikeyan, S., Nesterenko, M.: RFID Security without Extensive Cryptography. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67 (2005)
Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: CCS 2004. Conference on Computer and Communications Security, pp. 210–219 (2004)
Ohkubo, M., Suzki, K., Kinoshita, S.: Cryptographic Approach to Privacyfriendly Tags. In: RFID Privacy Workshop, MIT, MA (2003)
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual Authentication Protocol for Low-cost RFID. In: The Encrypt Workshop on RFID and Lightweight Crypto (2005)
An, Y., Oh, S.: RFID System for User’s Privacy Protection. In: Asia-Pacific Conference on Communications, pp. 516–519 (2005)
Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9, http://epcis.mit.edu/CS/files/folders/epcglobal/entry21.aspx
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 11–12. Springer, Heidelberg (2006)
Lo, N.W., Yeh, K.-H.: Novel RFID Authentication Schemes for Security Enhancement and System Efficiency. In: SDM 2007. The 4th VLDB workshop on Secure Data Management, September. LNCS, Springer, Heidelberg (to appear, 2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lo, N.W., Yeh, KH. (2007). An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2007. Lecture Notes in Computer Science, vol 4809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77090-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-77090-9_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77089-3
Online ISBN: 978-3-540-77090-9
eBook Packages: Computer ScienceComputer Science (R0)