Abstract
Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved the security of the protocol through the extended strand space model. This paper presents a more efficient authentication and key agreement protocol for RFID system than He et al.’s protocol. Compare with He et al.’s protocol, the proposed protocol reduces the computational costs as well as protocol communication rounds to agree a shared session key between the reader and the tag.
Chapter PDF
Similar content being viewed by others
References
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency Identification: Secure Risks and Challenges, RSA Laboratories Cryptobytes, pp. 2–9 (June 2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, pp. 719–724 (2004)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-based RFID Protocol. In: Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security(PerSec 2005), Washington. DC, USA, pp. 110–114 (2005)
Zhou, Y.B., Feng, D.G.: Design and Analysis of Cryptographic Protocols for RFID. Chinese Journal of Computers, 582–589 (April 2006)
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291–306. Springer, Heidelberg (2006)
Kinoshita, S., Hoshino, F., Komuro, T., Fujimura, A., Ohkubo, M.: Low-cost RFID Privacy Protection Scheme. IPSJ 45(8), 2004–2021 (2007)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to “privacy-friendly” tags. In: RFID Privacy Workshop (2003)
Saito, J., Sakurai, K.: Owner Transferable Privacy Protection Scheme for RFID Tags. In: CSS 2005. IPSJ Symposium Series, pp. 283–288 (2005)
Han, D.G., Takagi, T., Kim, H.W., Chung, K.I.: New Security Problem in RFID Systems Tag Killing. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 375–384. Springer, Heidelberg (2006)
Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An Efficient and Secure RFID Security Method with Ownership Transfer. In: International Conference on Computational Intelligence and Security, 2006, pp. 1090–1095 (2006)
He, L., Gan, Y., Li, N.N., Cai, Z.Y.: A Security-provable Authentication and Key Agreement Protocol in RFID System. In: International Conference on Wireless Communications, Networking and Mobile Computing, 2007, vol. 1(1), pp. 2078–2080 (2007)
Fabrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security, 191–230 (July 1999)
Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand Spaces: Why is a Security Protocol Correct. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 160–171. IEEE Computer Society Press, Los Alamitos (1998)
Shen, H.F., Xue, R., Huangn, H.Y., Chen, Z.X.: Extending the Theory of Strand Spaces. Journal of Software, 1785–1789 (October 2005)
Schneier, B.: Applied Cryptography Protocols, Algorithms and Source Code in C, 2nd edn. John Wiley & Sons Inc., Chichester (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2008). An Efficient Authentication and Key Agreement Protocol in RFID System. In: Cao, J., Li, M., Wu, MY., Chen, J. (eds) Network and Parallel Computing. NPC 2008. Lecture Notes in Computer Science, vol 5245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88140-7_29
Download citation
DOI: https://doi.org/10.1007/978-3-540-88140-7_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88139-1
Online ISBN: 978-3-540-88140-7
eBook Packages: Computer ScienceComputer Science (R0)