Abstract
RFID systems are spreading in the area of the industry and marketplace faster and now this time it is coming up to usual area covering individual life and environment as a core element of the ubiquitous technologies. But the RFID system has RF device communicates each other by radio frequency and it could make some serious problems on the important area such as privacy violation and information security. In this paper, we propose multi-keys RFID tag scheme including tag structure and authentication protocol which can support efficient security on the tag information by using SEED algorithm. The multi-key RFID tag could maintain multiple object IDs for different applications in a single tag and allow simultaneous access for their pair applications. The authentication protocol for multi-key RFID tag is designed to overcome the security and privacy problems and has enough robustness against the various attacks on the RFID system with low cost. We compared the security capability of the schemes and the evaluation results showed the proposed scheme has better efficiency than existing schemes.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices, Masters thesis, MIT (2003), http://theory.lcs.mit.edu/~sweis/masters.pdf
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–202. Springer, Heidelberg (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags, RFID Privacy Workshop (2003), http://www.frid.edu.com
Saito, J., Sakurai, K.: Variable ID Scheme of Anonymity in RFID tags. The 2004 Symposium on Cryptography and Information Security 1, 713–718 (2004)
Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)
mCloak: Personal/corporate management of wireless devices and technology (2003), http://www.mobilecloak.com
ISO/IEC/JTC 1/SC 31, Information technology–Radio frequency identification for item management–Unique identification for RF tags, ISO/IEC 15963 (2004)
Telecommunication Technology Association (TTA), Technical Report on Numbering an RFID tag, TTA Technical Report TTAR-06.0013 (2006)
IETF, The SEED Encryption Algorithm, IETF RFC 4269 (2005)
Garfinkel, S., Rosenberg, B. (eds.): RFID-Applications, Security and Privacy. Addison Wesley, New York (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J. et al. (2007). A Design of Authentication Protocol for Multi-key RFID Tag. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_71
Download citation
DOI: https://doi.org/10.1007/978-3-540-72909-9_71
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72908-2
Online ISBN: 978-3-540-72909-9
eBook Packages: Computer ScienceComputer Science (R0)