Skip to main content

Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard

  • Conference paper
Book cover Frontiers of High Performance Computing and Networking ISPA 2007 Workshops (ISPA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4743))

Abstract

There are many researches related to privacy protection in RFID system. Among them, Ohkubo’s hash-based scheme is provably secure and it can protect user’s privacy, prevent location tracking, and guarantee forward security completely. Unfortunately, one-way hash functions, which play important roles in Ohkubo’s schem, can’t be implemented into the current RFID tag hardware. So we propose a new secure protocol for RFID privacy protection, and it is a modified version of Ohkubo’s scheme using Feldhofer’s AES module for RFID tag. Our new scheme has almost all of advantages of Ohkubo’s scheme and moreover it can be embedded into RFID tag hardware easily.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop, MIT, MA, USA (November 2003)

    Google Scholar 

  2. Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient hash-chain based RFID privacy protection scheme. In: International Conference on Ubiquitous Computing – Ubicomp, Workshop Privacy: Current Status and Future Directions, Nottingham, England (September 2004)

    Google Scholar 

  3. Avoine, G., Oechslin, P.: A scalable and provably secure hash based RFID protocol. In: International Workshop on Pervasive Computing and Communication Security – PerSec 2005, Kauai Island, Hawaii, USA, pp. 110–114. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  4. Avoine, G.: Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)

    Google Scholar 

  5. Avoine, G., Oechslin, P.: RFID traceability: A multilayer problem. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125–140. Springer, Heidelberg (2005)

    Google Scholar 

  6. Yeo, S.S., Kim, S.K.: Scalable and flexible privacy protection scheme for RFID systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153–163. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)

    Google Scholar 

  8. Kim, S.C., Yeo, S.S., Kim, S.K.: MARP: Mobile agent for rfid privacy protection. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 300–312. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Yeo, S.S., Kim, S.C., Kim, S.K.: eMARP: Enhanced mobile agent for RFID privacy protection and forgery detection. In: Nguyen, N., Grzech, A., Howlett, R., Jain, L. (eds.) First KES Symposium on Agent and Multi-Agent Systems – AMSTA 2007. LNCS, vol. 4496, pp. 318–327. Springer, Heidelberg (2007)

    Google Scholar 

  10. Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: Printed handout of Workshop on RFID Security – RFIDSec 06 (July 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Parimala Thulasiraman Xubin He Tony Li Xu Mieso K. Denko Ruppa K. Thulasiram Laurence T. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yeo, SS., Sakurai, K., Cho, S., Yang, K., Kim, S.K. (2007). Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74767-3_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74766-6

  • Online ISBN: 978-3-540-74767-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics