Skip to main content

A Design of Authentication Protocol for Multi-key RFID Tag

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4537))

Abstract

RFID systems are spreading in the area of the industry and marketplace faster and now this time it is coming up to usual area covering individual life and environment as a core element of the ubiquitous technologies. But the RFID system has RF device communicates each other by radio frequency and it could make some serious problems on the important area such as privacy violation and information security. In this paper, we propose multi-keys RFID tag scheme including tag structure and authentication protocol which can support efficient security on the tag information by using SEED algorithm. The multi-key RFID tag could maintain multiple object IDs for different applications in a single tag and allow simultaneous access for their pair applications. The authentication protocol for multi-key RFID tag is designed to overcome the security and privacy problems and has enough robustness against the various attacks on the RFID system with low cost. We compared the security capability of the schemes and the evaluation results showed the proposed scheme has better efficiency than existing schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices, Masters thesis, MIT (2003), http://theory.lcs.mit.edu/~sweis/masters.pdf

  2. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–202. Springer, Heidelberg (2003)

    Google Scholar 

  3. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags, RFID Privacy Workshop (2003), http://www.frid.edu.com

  4. Saito, J., Sakurai, K.: Variable ID Scheme of Anonymity in RFID tags. The 2004 Symposium on Cryptography and Information Security 1, 713–718 (2004)

    Google Scholar 

  5. Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103–111 (2003)

    Google Scholar 

  6. mCloak: Personal/corporate management of wireless devices and technology (2003), http://www.mobilecloak.com

  7. ISO/IEC/JTC 1/SC 31, Information technology–Radio frequency identification for item management–Unique identification for RF tags, ISO/IEC 15963 (2004)

    Google Scholar 

  8. Telecommunication Technology Association (TTA), Technical Report on Numbering an RFID tag, TTA Technical Report TTAR-06.0013 (2006)

    Google Scholar 

  9. IETF, The SEED Encryption Algorithm, IETF RFC 4269 (2005)

    Google Scholar 

  10. Garfinkel, S., Rosenberg, B. (eds.): RFID-Applications, Security and Privacy. Addison Wesley, New York (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kevin Chen-Chuan Chang Wei Wang Lei Chen Clarence A. Ellis Ching-Hsien Hsu Ah Chung Tsoi Haixun Wang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J. et al. (2007). A Design of Authentication Protocol for Multi-key RFID Tag. In: Chang, K.CC., et al. Advances in Web and Network Technologies, and Information Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72909-9_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72909-9_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72908-2

  • Online ISBN: 978-3-540-72909-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics